INFO: task kworker/1:1:43 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1 state:D stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:df911d84 r8:00000002 r7:60000013 r6:df911d8c r5:832f4800 r4:832f4800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:832f4800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df911e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d8480 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:832f4800 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9fd000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527ab8c r4:8527a800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8527ab8c r4:832d0e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:832f4800 r8:832d0e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:832d0e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832d0e00 r8:8027f5e8 r7:df879e60 r6:83809080 r5:832f4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:832d1e40 INFO: task kworker/1:1:43 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: b9616000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 INFO: task kworker/1:0:3093 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:0 state:D stack:0 pid:3093 tgid:3093 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:df9cdd84 r8:00000002 r7:60000113 r6:df9cdd8c r5:8330e000 r4:8330e000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8330e000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9cde08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859fd0c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8330e000 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8b7000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a0eb8c r4:85a0e800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a0eb8c r4:8461dd00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8330e000 r8:8461dd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8461dd00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8461dd00 r8:8027f5e8 r7:df91de60 r6:84777c00 r5:8330e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9cdfb0 to 0xdf9cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d42ec0 INFO: task kworker/1:0:3093 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: b9616000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 INFO: task kworker/0:0:3099 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:0 state:D stack:0 pid:3099 tgid:3099 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:df975d84 r8:00000002 r7:60000113 r6:df975d8c r5:84522400 r4:84522400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84522400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df975e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8479b2c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84522400 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8873000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84feab8c r4:84fea800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84feab8c r4:84777e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84522400 r8:84777eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84777e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84777e80 r8:8027f5e8 r7:df845e60 r6:84777e00 r5:84522400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf975fb0 to 0xdf975ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d6a5c0 INFO: task kworker/0:0:3099 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: b98c2000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 INFO: task kworker/1:3:3111 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:3 state:D stack:0 pid:3111 tgid:3111 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:df96dd84 r8:00000002 r7:60000013 r6:df96dd8c r5:83a90000 r4:83a90000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a90000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df96de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859fdbc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83a90000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca19000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a18f8c r4:85a18c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a18f8c r4:8461d600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a90000 r8:8461d62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8461d600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8461d600 r8:8027f5e8 r7:df91de60 r6:8461d500 r5:83a90000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf96dfb0 to 0xdf96dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d46740 INFO: task kworker/1:3:3111 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: b9fd8000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 INFO: task kworker/1:6:3117 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:6 state:D stack:0 pid:3117 tgid:3117 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:df9d5d84 r8:00000002 r7:60000113 r6:df9d5d8c r5:83a29800 r4:83a29800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a29800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859fdf00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83a29800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca71000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a19b8c r4:85a19800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a19b8c r4:8461d280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a29800 r8:8461d2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8461d280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8461d280 r8:8027f5e8 r7:df91de60 r6:8461d180 r5:83a29800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9d5fb0 to 0xdf9d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d46a40 INFO: task kworker/1:6:3117 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: b9fd8000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 INFO: task kworker/1:7:3122 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:7 state:D stack:0 pid:3122 tgid:3122 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:df9f5d84 r8:00000002 r7:60000113 r6:df9f5d8c r5:83242400 r4:83242400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83242400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851c8200 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83242400 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9db000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84430f8c r4:84430c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84430f8c r4:8461d080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83242400 r8:8461d0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8461d080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8461d080 r8:8027f5e8 r7:df9d5e60 r6:8461d100 r5:83242400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f5fb0 to 0xdf9f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d46c40 INFO: task kworker/1:7:3122 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: ba28d000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 INFO: task kworker/0:4:3125 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:4 state:D stack:0 pid:3125 tgid:3125 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfa01d84 r8:00000002 r7:60000113 r6:dfa01d8c r5:844fc800 r4:844fc800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844fc800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa01e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8517dc00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844fc800 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e070d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fcb38c r4:84fcb000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fcb38c r4:84777b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844fc800 r8:84777b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84777b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84777b00 r8:8027f5e8 r7:df975e60 r6:8461d200 r5:844fc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa01fb0 to 0xdfa01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d99780 INFO: task kworker/0:4:3125 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: ba28d000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 INFO: task kworker/0:5:3127 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:5 state:D stack:0 pid:3127 tgid:3127 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfa11d84 r8:00000002 r7:60000113 r6:dfa11d8c r5:844f9800 r4:844f9800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844f9800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa11e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85066340 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844f9800 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fc8b8c r4:84fc8800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fc8b8c r4:84777900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844f9800 r8:8477792c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84777900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84777900 r8:8027f5e8 r7:dfa01e60 r6:8461d580 r5:844f9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa11fb0 to 0xdfa11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d99800 INFO: task kworker/0:5:3127 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: ba60f000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 INFO: task kworker/0:6:3129 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:6 state:D stack:0 pid:3129 tgid:3129 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfa21d84 r8:00000002 r7:60000013 r6:dfa21d8c r5:844fb000 r4:844fb000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844fb000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa21e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ef640 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844fb000 r7:00000000 r6:83018000 r5:00001000 r4:7f027000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa35000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8454b78c r4:8454b400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8454b78c r4:84777980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844fb000 r8:847779ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84777980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84777980 r8:8027f5e8 r7:dfa01e60 r6:8461d680 r5:844fb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa21fb0 to 0xdfa21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d99800 INFO: task kworker/0:6:3129 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: ba8d3000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 INFO: task kworker/0:7:3130 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:7 state:D stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfa25d84 r8:00000002 r7:60000113 r6:dfa25d8c r5:83252400 r4:83252400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83252400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa25e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85203700 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83252400 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05cd000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8454af8c r4:8454ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8454af8c r4:84777580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83252400 r8:847775ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84777580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84777580 r8:8027f5e8 r7:dfa21e60 r6:8461d700 r5:83252400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa25fb0 to 0xdfa25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d99800 INFO: task kworker/0:7:3130 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bab6a000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:8:3132 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:8 state:D stack:0 pid:3132 tgid:3132 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfa39d84 r8:00000002 r7:60000013 r6:dfa39d8c r5:83238c00 r4:83238c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83238c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa39e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522e7c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83238c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0cf000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead8d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8454ab8c r4:8454a800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8454ab8c r4:84777480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83238c00 r8:847774ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84777480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84777480 r8:8027f5e8 r7:dfa21e60 r6:8461d800 r5:83238c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa39fb0 to 0xdfa39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d99d00 INFO: task kworker/0:8:3132 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bab6a000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:9:3134 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:9 state:D stack:0 pid:3134 tgid:3134 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfa49d84 r8:00000002 r7:60000113 r6:dfa49d8c r5:839f5400 r4:839f5400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:839f5400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa49e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ca900 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:839f5400 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9eb000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c838c r4:853c8000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853c838c r4:84777d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:839f5400 r8:84777dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84777d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84777d80 r8:8027f5e8 r7:dfa21e60 r6:8461d780 r5:839f5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa49fb0 to 0xdfa49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d99d40 INFO: task kworker/0:9:3134 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bae9f000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:8:3137 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:8 state:D stack:0 pid:3137 tgid:3137 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfa5dd84 r8:00000002 r7:60000013 r6:dfa5dd8c r5:839f6c00 r4:839f6c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:839f6c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa5de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851bdec0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:839f6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2cb000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b6b8c r4:853b6800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853b6b8c r4:8461d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:839f6c00 r8:8461d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8461d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8461d880 r8:8027f5e8 r7:df9d5e60 r6:8461d980 r5:839f6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa5dfb0 to 0xdfa5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847693c0 INFO: task kworker/1:8:3137 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bb221000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:10:3139 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:10 state:D stack:0 pid:3139 tgid:3139 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfa6dd84 r8:00000002 r7:60000113 r6:dfa6dd8c r5:83256000 r4:83256000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83256000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa6de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852bd640 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83256000 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb117000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b778c r4:853b7400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b778c r4:84777d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83256000 r8:84777d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84777d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84777d00 r8:8027f5e8 r7:dfa49e60 r6:8461d900 r5:83256000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa6dfb0 to 0xdfa6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d99f00 INFO: task kworker/0:10:3139 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bb4cd000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:9:3142 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:9 state:D stack:0 pid:3142 tgid:3142 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfa8dd84 r8:00000002 r7:60000013 r6:dfa8dd8c r5:844bbc00 r4:844bbc00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844bbc00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa8de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8595b8c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:844bbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8a1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a0e78c r4:85a0e400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a0e78c r4:8461db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844bbc00 r8:8461db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8461db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8461db00 r8:8027f5e8 r7:df9d5e60 r6:8461db80 r5:844bbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa8dfb0 to 0xdfa8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847695c0 INFO: task kworker/1:9:3142 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bb545000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:11:3144 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:11 state:D stack:0 pid:3144 tgid:3144 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfa91d84 r8:00000002 r7:60000113 r6:dfa91d8c r5:844bd400 r4:844bd400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844bd400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa91e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8548d2c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844bd400 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd9000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853cbb8c r4:853cb800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853cbb8c r4:841a4e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844bd400 r8:841a4e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:841a4e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:841a4e00 r8:8027f5e8 r7:dfa49e60 r6:8461da80 r5:844bd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa91fb0 to 0xdfa91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d46040 INFO: task kworker/0:11:3144 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bb9b9000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:12:3145 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:12 state:D stack:0 pid:3145 tgid:3145 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfa95d84 r8:00000002 r7:60000113 r6:dfa95d8c r5:844b8c00 r4:844b8c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844b8c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa95e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8548b5c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa69000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546038c r4:85460000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546038c r4:841a4d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844b8c00 r8:841a4dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:841a4d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:841a4d80 r8:8027f5e8 r7:dfa91e60 r6:8461da00 r5:844b8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa95fb0 to 0xdfa95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d46040 INFO: task kworker/0:12:3145 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bbc31000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:13:3147 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:13 state:D stack:0 pid:3147 tgid:3147 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfaa9d84 r8:00000002 r7:60000113 r6:dfaa9d8c r5:844bb000 r4:844bb000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844bb000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8559bc00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844bb000 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb439000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854e138c r4:854e1000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854e138c r4:84777f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844bb000 r8:84777f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84777f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84777f00 r8:8027f5e8 r7:dfa91e60 r6:8461dc00 r5:844bb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaa9fb0 to 0xdfaa9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d4b300 INFO: task kworker/0:13:3147 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bbe49000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:14:3150 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:14 state:D stack:0 pid:3150 tgid:3150 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfabdd84 r8:00000002 r7:60000113 r6:dfabdd8c r5:844b8000 r4:844b8000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844b8000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfabde08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85578880 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844b8000 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1b1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84237f8c r4:84237c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84237f8c r4:83cad800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844b8000 r8:83cad82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:83cad800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83cad800 r8:8027f5e8 r7:dfaa9e60 r6:8461de00 r5:844b8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfabdfb0 to 0xdfabdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d4b180 INFO: task kworker/0:14:3150 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bbe49000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:15:3151 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:15 state:D stack:0 pid:3151 tgid:3151 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:df9d9d84 r8:00000002 r7:60000113 r6:df9d9d8c r5:83a3bc00 r4:83a3bc00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a3bc00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85665700 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a3bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0537000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854e3f8c r4:854e3c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854e3f8c r4:830b8780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a3bc00 r8:830b87ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:830b8780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8780 r8:8027f5e8 r7:dfaa9e60 r6:830b8680 r5:83a3bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9d9fb0 to 0xdf9d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d4b240 INFO: task kworker/0:15:3151 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bc16c000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:16:3154 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:16 state:D stack:0 pid:3154 tgid:3154 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfac9d84 r8:00000002 r7:60000113 r6:dfac9d8c r5:83a38000 r4:83a38000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a38000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfac9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85603e00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a38000 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa97000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854e238c r4:854e2000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854e238c r4:830b8480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a38000 r8:830b84ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:830b8480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8480 r8:8027f5e8 r7:df9d9e60 r6:830b8400 r5:83a38000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfac9fb0 to 0xdfac9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d4b400 INFO: task kworker/0:16:3154 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bc46d000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:17:3157 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:17 state:D stack:0 pid:3157 tgid:3157 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfad5d84 r8:00000002 r7:60000113 r6:dfad5d8c r5:83a3a400 r4:83a3a400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a3a400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857bd380 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a3a400 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea8e9000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8575a38c r4:8575a000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8575a38c r4:84d2a280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a3a400 r8:84d2a2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d2a280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d2a280 r8:8027f5e8 r7:df9d9e60 r6:841a5d80 r5:83a3a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfad5fb0 to 0xdfad5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d4b6c0 INFO: task kworker/0:17:3157 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bc64c000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:18:3158 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:18 state:D stack:0 pid:3158 tgid:3158 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:df9f9d84 r8:00000002 r7:60000113 r6:df9f9d8c r5:83a38c00 r4:83a38c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a38c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8565e040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a38c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac7f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854ea78c r4:854ea400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854ea78c r4:841a5b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a38c00 r8:841a5b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:841a5b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:841a5b00 r8:8027f5e8 r7:dfad5e60 r6:83327900 r5:83a38c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f9fb0 to 0xdf9f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d4b800 INFO: task kworker/0:18:3158 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bc786000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:19:3161 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:19 state:D stack:0 pid:3161 tgid:3161 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfae1d84 r8:00000002 r7:60000113 r6:dfae1d8c r5:83a1ec00 r4:83a1ec00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a1ec00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85674480 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a1ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffc1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85714b8c r4:85714800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85714b8c r4:83327680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a1ec00 r8:833276ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:83327680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83327680 r8:8027f5e8 r7:dfad5e60 r6:832bc180 r5:83a1ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae1fb0 to 0xdfae1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d4b9c0 INFO: task kworker/0:19:3161 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bca37000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:20:3162 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:20 state:D stack:0 pid:3162 tgid:3162 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfaf9d84 r8:00000002 r7:60000113 r6:dfaf9d8c r5:83a18c00 r4:83a18c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a18c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85836540 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a18c00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47f7000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85872f8c r4:85872c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85872f8c r4:83842000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a18c00 r8:8384202c r7:82804d40 r6:dddced80 r5:dddceda0 r4:83842000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83842000 r8:8027f5e8 r7:dfad5e60 r6:83842900 r5:83a18c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaf9fb0 to 0xdfaf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d4b9c0 INFO: task kworker/0:20:3162 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bcdba000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:21:3164 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:21 state:D stack:0 pid:3164 tgid:3164 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfaedd84 r8:00000002 r7:60000113 r6:dfaedd8c r5:83a1c800 r4:83a1c800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a1c800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaede08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858350c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a1c800 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaef000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85717b8c r4:85717800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85717b8c r4:83842c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a1c800 r8:83842c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:83842c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83842c00 r8:8027f5e8 r7:dfaf9e60 r6:83842880 r5:83a1c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaedfb0 to 0xdfaedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d4b9c0 INFO: task kworker/0:21:3164 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bcdba000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:22:3166 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:22 state:D stack:0 pid:3166 tgid:3166 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfb05d84 r8:00000002 r7:60000113 r6:dfb05d8c r5:83a19800 r4:83a19800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a19800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb05e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85856100 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a19800 r7:00000000 r6:83018000 r5:00001000 r4:7f0e3000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca17000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85873b8c r4:85873800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85873b8c r4:83842b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a19800 r8:83842bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:83842b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83842b80 r8:8027f5e8 r7:dfaf9e60 r6:8431f180 r5:83a19800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb05fb0 to 0xdfb05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d4be40 INFO: task kworker/0:22:3166 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bd083000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:23:3167 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:23 state:D stack:0 pid:3167 tgid:3167 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfb11d84 r8:00000002 r7:60000113 r6:dfb11d8c r5:83a1bc00 r4:83a1bc00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a1bc00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb11e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859f79c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a1bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec733000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858a578c r4:858a5400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858a578c r4:8431f100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a1bc00 r8:8431f12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8431f100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8431f100 r8:8027f5e8 r7:dfb05e60 r6:83861300 r5:83a1bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb11fb0 to 0xdfb11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d5b000 INFO: task kworker/0:23:3167 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bd083000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:24:3169 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:24 state:D stack:0 pid:3169 tgid:3169 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfb29d84 r8:00000002 r7:60000113 r6:dfb29d8c r5:838b8c00 r4:838b8c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:838b8c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb29e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85941d40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:838b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaec1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84c3a38c r4:84c3a000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84c3a38c r4:83861500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:838b8c00 r8:8386152c r7:82804d40 r6:dddced80 r5:dddceda0 r4:83861500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83861500 r8:8027f5e8 r7:dfb11e60 r6:83861400 r5:838b8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb29fb0 to 0xdfb29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d5b180 INFO: task kworker/0:24:3169 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bd4a5000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:25:3172 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:25 state:D stack:0 pid:3172 tgid:3172 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfb4dd84 r8:00000002 r7:60000113 r6:dfb4dd8c r5:844ba400 r4:844ba400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844ba400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb4de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84716700 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f0f7000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec553000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858a5b8c r4:858a5800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858a5b8c r4:83861480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844ba400 r8:838614ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:83861480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83861480 r8:8027f5e8 r7:dfb11e60 r6:8461df00 r5:844ba400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb4dfb0 to 0xdfb4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d5b380 INFO: task kworker/0:25:3172 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bd4a5000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:26:3174 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:26 state:D stack:0 pid:3174 tgid:3174 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfb5dd84 r8:00000002 r7:60000113 r6:dfb5dd8c r5:844be000 r4:844be000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844be000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb5de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a46700 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844be000 r7:00000000 r6:83018000 r5:00001000 r4:7f0f5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec513000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3078c r4:85a30400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a3078c r4:8333c080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844be000 r8:8333c0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8333c080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8333c080 r8:8027f5e8 r7:dfb11e60 r6:8461df80 r5:844be000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb5dfb0 to 0xdfb5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d5b400 INFO: task kworker/0:26:3174 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bd755000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:27:3175 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:27 state:D stack:0 pid:3175 tgid:3175 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfb1dd84 r8:00000002 r7:60000113 r6:dfb1dd8c r5:838b9800 r4:838b9800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:838b9800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb1de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84716640 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:838b9800 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9ed000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a2b78c r4:85a2b400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a2b78c r4:8333c100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:838b9800 r8:8333c12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8333c100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8333c100 r8:8027f5e8 r7:dfb5de60 r6:8333c000 r5:838b9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb1dfb0 to 0xdfb1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d5b400 INFO: task kworker/0:27:3175 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bd755000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:28:3178 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:28 state:D stack:0 pid:3178 tgid:3178 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfb51d84 r8:00000002 r7:60000113 r6:dfb51d8c r5:838ba400 r4:838ba400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:838ba400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb51e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f9e80 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:838ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f1e1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7c5000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7e78c r4:85a7e400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a7e78c r4:8383ab80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:838ba400 r8:8383abac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8383ab80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8383ab80 r8:8027f5e8 r7:dfb5de60 r6:830cc100 r5:838ba400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb51fb0 to 0xdfb51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d5b740 INFO: task kworker/0:28:3178 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bda4e000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:29:3179 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:29 state:D stack:0 pid:3179 tgid:3179 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfb35d84 r8:00000002 r7:60000113 r6:dfb35d8c r5:838bd400 r4:838bd400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:838bd400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb35e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859f7200 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:838bd400 r7:00000000 r6:83018000 r5:00001000 r4:7f11b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb181000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858a678c r4:858a6400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858a678c r4:830cc080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:838bd400 r8:830cc0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:830cc080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cc080 r8:8027f5e8 r7:dfb51e60 r6:84eca000 r5:838bd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb35fb0 to 0xdfb35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d5b740 INFO: task kworker/0:29:3179 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bdc1c000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:30:3182 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:30 state:D stack:0 pid:3182 tgid:3182 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfb6dd84 r8:00000002 r7:60000113 r6:dfb6dd8c r5:838be000 r4:838be000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:838be000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb6de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a59400 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:838be000 r7:00000000 r6:83018000 r5:00001000 r4:7f173000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd65000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a3f38c r4:85a3f000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a3f38c r4:84eca080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:838be000 r8:84eca0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84eca080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84eca080 r8:8027f5e8 r7:dfb51e60 r6:84eca100 r5:838be000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb6dfb0 to 0xdfb6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d5ba80 INFO: task kworker/0:30:3182 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bdc1c000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:31:3183 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:31 state:D stack:0 pid:3183 tgid:3183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfb79d84 r8:00000002 r7:60000113 r6:dfb79d8c r5:838bb000 r4:838bb000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:838bb000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb79e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85230180 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:838bb000 r7:00000000 r6:83018000 r5:00001000 r4:7f27b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfba7000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84cbd38c r4:84cbd000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84cbd38c r4:84eca200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:838bb000 r8:84eca22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84eca200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84eca200 r8:8027f5e8 r7:dfb51e60 r6:84eca280 r5:838bb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb79fb0 to 0xdfb79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d5bc80 INFO: task kworker/0:31:3183 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bdeb2000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:32:3186 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:32 state:D stack:0 pid:3186 tgid:3186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfb99d84 r8:00000002 r7:60000113 r6:dfb99d8c r5:838bec00 r4:838bec00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:838bec00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb99e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b5c540 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:838bec00 r7:00000000 r6:83018000 r5:00001000 r4:7f50d000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed22f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84cbdb8c r4:84cbd800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84cbdb8c r4:84eca300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:838bec00 r8:84eca32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84eca300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84eca300 r8:8027f5e8 r7:dfb79e60 r6:84eca380 r5:838bec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb99fb0 to 0xdfb99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d5be40 INFO: task kworker/0:32:3186 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: be37c000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:33:3188 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:33 state:D stack:0 pid:3188 tgid:3188 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfba5d84 r8:00000002 r7:60000113 r6:dfba5d8c r5:83a8bc00 r4:83a8bc00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a8bc00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfba5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85230b40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a8bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f275000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb133000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858a7b8c r4:858a7800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858a7b8c r4:84eca400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a8bc00 r8:84eca42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84eca400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84eca400 r8:8027f5e8 r7:dfb99e60 r6:84eca480 r5:83a8bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfba5fb0 to 0xdfba5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84769680 INFO: task kworker/0:33:3188 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: be57c000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:34:3190 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:34 state:D stack:0 pid:3190 tgid:3190 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfbb1d84 r8:00000002 r7:60000113 r6:dfbb1d8c r5:83a8ec00 r4:83a8ec00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a8ec00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbb1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a0940 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a8ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f271000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb35d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a9078c r4:85a90400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a9078c r4:84eca500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a8ec00 r8:84eca52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84eca500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84eca500 r8:8027f5e8 r7:dfba5e60 r6:84eca580 r5:83a8ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbb1fb0 to 0xdfbb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84eeb000 INFO: task kworker/0:34:3190 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: be57c000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:35:3192 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:35 state:D stack:0 pid:3192 tgid:3192 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfbbdd84 r8:00000002 r7:60000113 r6:dfbbdd8c r5:838bc800 r4:838bc800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:838bc800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbbde08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85230fc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:838bc800 r7:00000000 r6:83018000 r5:00001000 r4:7f273000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb6f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858a778c r4:858a7400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858a778c r4:84eca600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:838bc800 r8:84eca62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84eca600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84eca600 r8:8027f5e8 r7:dfbb1e60 r6:84eca680 r5:838bc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbbdfb0 to 0xdfbbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84eeb300 INFO: task kworker/0:35:3192 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: beab7000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:36:3194 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:36 state:D stack:0 pid:3194 tgid:3194 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfb85d84 r8:00000002 r7:60000113 r6:dfb85d8c r5:83a88c00 r4:83a88c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a88c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb85e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b5c440 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a88c00 r7:00000000 r6:83018000 r5:00001000 r4:7f509000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1f9000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84cbc38c r4:84cbc000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84cbc38c r4:84eca700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a88c00 r8:84eca72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84eca700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84eca700 r8:8027f5e8 r7:dfbb1e60 r6:84eca780 r5:83a88c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb85fb0 to 0xdfb85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84eeb540 INFO: task kworker/0:36:3194 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: beab7000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:37:3196 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:37 state:D stack:0 pid:3196 tgid:3196 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfbc9d84 r8:00000002 r7:60000113 r6:dfbc9d8c r5:83a02400 r4:83a02400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a02400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbc9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85230ec0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a02400 r7:00000000 r6:83018000 r5:00001000 r4:7f26b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb74d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858a738c r4:858a7000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858a738c r4:84eca800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a02400 r8:84eca82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84eca800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84eca800 r8:8027f5e8 r7:dfb85e60 r6:84eca880 r5:83a02400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbc9fb0 to 0xdfbc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84eeb540 INFO: task kworker/0:37:3196 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bedc2000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:38:3199 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:38 state:D stack:0 pid:3199 tgid:3199 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfbd5d84 r8:00000002 r7:60000113 r6:dfbd5d8c r5:83a05400 r4:83a05400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a05400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8583f9c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a05400 r7:00000000 r6:83018000 r5:00001000 r4:7f4d5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed421000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84cbcb8c r4:84cbc800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84cbcb8c r4:84eca900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a05400 r8:84eca92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84eca900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84eca900 r8:8027f5e8 r7:dfb85e60 r6:84eca980 r5:83a05400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbd5fb0 to 0xdfbd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84eeb7c0 INFO: task kworker/0:38:3199 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bedc2000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:39:3201 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:39 state:D stack:0 pid:3201 tgid:3201 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfbf5d84 r8:00000002 r7:60000113 r6:dfbf5d8c r5:83a01800 r4:83a01800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a01800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858405c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a01800 r7:00000000 r6:83018000 r5:00001000 r4:7f449000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9c1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84cbdf8c r4:84cbdc00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84cbdf8c r4:84ecaa00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a01800 r8:84ecaa2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ecaa00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ecaa00 r8:8027f5e8 r7:dfbd5e60 r6:84ecaa80 r5:83a01800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbf5fb0 to 0xdfbf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84eeb900 INFO: task kworker/0:39:3201 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bf036000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:10:3202 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:10 state:D stack:0 pid:3202 tgid:3202 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfbf9d84 r8:00000002 r7:60000113 r6:dfbf9d8c r5:8418a400 r4:8418a400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8418a400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859fd300 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8418a400 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8c9000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a0ef8c r4:85a0ec00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a0ef8c r4:8461dd80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8418a400 r8:8461ddac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8461dd80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8461dd80 r8:8027f5e8 r7:df9d5e60 r6:84ecab00 r5:8418a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbf9fb0 to 0xdfbf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ec9600 INFO: task kworker/1:10:3202 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bf036000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:40:3203 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:40 state:D stack:0 pid:3203 tgid:3203 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfc05d84 r8:00000002 r7:60000113 r6:dfc05d8c r5:84550000 r4:84550000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84550000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc05e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85840e00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84550000 r7:00000000 r6:83018000 r5:00001000 r4:7f49f000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed243000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b0578c r4:85b05400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85b0578c r4:84ecab80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84550000 r8:84ecabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ecab80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ecab80 r8:8027f5e8 r7:dfbf5e60 r6:84ecac00 r5:84550000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc05fb0 to 0xdfc05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84eebd40 INFO: task kworker/0:40:3203 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bf36e000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:41:3206 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:41 state:D stack:0 pid:3206 tgid:3206 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfbe9d84 r8:00000002 r7:60000113 r6:dfbe9d8c r5:84551800 r4:84551800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84551800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbe9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85840480 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84551800 r7:00000000 r6:83018000 r5:00001000 r4:7f447000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd23000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84cbe38c r4:84cbe000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84cbe38c r4:84ecac80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84551800 r8:84ecacac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ecac80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ecac80 r8:8027f5e8 r7:dfbf5e60 r6:84ecad00 r5:84551800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbe9fb0 to 0xdfbe9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84eebf80 INFO: task kworker/0:41:3206 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bf36e000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:42:3207 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:42 state:D stack:0 pid:3207 tgid:3207 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfc1dd84 r8:00000002 r7:60000113 r6:dfc1dd8c r5:84552400 r4:84552400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84552400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc1de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8565b240 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84552400 r7:00000000 r6:83018000 r5:00001000 r4:7f3bb000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed205000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84cbff8c r4:84cbfc00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84cbff8c r4:84ecad80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84552400 r8:84ecadac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ecad80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ecad80 r8:8027f5e8 r7:dfbe9e60 r6:84ecae00 r5:84552400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc1dfb0 to 0xdfc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84eec0c0 INFO: task kworker/0:42:3207 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bf56b000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:43:3210 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:43 state:D stack:0 pid:3210 tgid:3210 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfc21d84 r8:00000002 r7:60000113 r6:dfc21d8c r5:84553c00 r4:84553c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84553c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc21e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c0a40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84553c00 r7:00000000 r6:83018000 r5:00001000 r4:7f2fb000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec555000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85aa238c r4:85aa2000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85aa238c r4:84ecae80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84553c00 r8:84ecaeac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ecae80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ecae80 r8:8027f5e8 r7:dfc1de60 r6:84ecaf00 r5:84553c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc21fb0 to 0xdfc21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84eec240 INFO: task kworker/0:43:3210 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bf56b000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:44:3211 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:44 state:D stack:0 pid:3211 tgid:3211 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfc35d84 r8:00000002 r7:60000113 r6:dfc35d8c r5:84555400 r4:84555400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84555400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc35e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8558d6c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84555400 r7:00000000 r6:83018000 r5:00001000 r4:7f345000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd3f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84cbfb8c r4:84cbf800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84cbfb8c r4:84ecaf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84555400 r8:84ecafac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ecaf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ecaf80 r8:8027f5e8 r7:dfc21e60 r6:84df2000 r5:84555400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc35fb0 to 0xdfc35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84eec4c0 INFO: task kworker/0:44:3211 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bf915000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:45:3214 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:45 state:D stack:0 pid:3214 tgid:3214 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfc11d84 r8:00000002 r7:60000113 r6:dfc11d8c r5:84553000 r4:84553000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84553000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc11e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85840380 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84553000 r7:00000000 r6:83018000 r5:00001000 r4:7f445000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd09000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84cbe78c r4:84cbe400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84cbe78c r4:84df2080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84553000 r8:84df20ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84df2080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84df2080 r8:8027f5e8 r7:dfc35e60 r6:84df2100 r5:84553000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc11fb0 to 0xdfc11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84eec740 INFO: task kworker/0:45:3214 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bfb36000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:46:3215 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:46 state:D stack:0 pid:3215 tgid:3215 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfc45d84 r8:00000002 r7:60000113 r6:dfc45d8c r5:84556000 r4:84556000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84556000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc45e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c0240 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84556000 r7:00000000 r6:83018000 r5:00001000 r4:7f399000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed17d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ae5f8c r4:85ae5c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ae5f8c r4:84df2180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84556000 r8:84df21ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84df2180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84df2180 r8:8027f5e8 r7:dfc11e60 r6:84df2200 r5:84556000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc45fb0 to 0xdfc45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84eec740 INFO: task kworker/0:46:3215 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bfb36000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:47:3218 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:47 state:D stack:0 pid:3218 tgid:3218 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfc41d84 r8:00000002 r7:60000113 r6:dfc41d8c r5:84556c00 r4:84556c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84556c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc41e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85840280 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84556c00 r7:00000000 r6:83018000 r5:00001000 r4:7f443000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecce1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84cbeb8c r4:84cbe800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84cbeb8c r4:84df2280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84556c00 r8:84df22ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84df2280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84df2280 r8:8027f5e8 r7:dfc11e60 r6:84df2300 r5:84556c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc41fb0 to 0xdfc41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84eecac0 INFO: task kworker/0:47:3218 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: bfebb000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:48:3219 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:48 state:D stack:0 pid:3219 tgid:3219 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfc49d84 r8:00000002 r7:60000113 r6:dfc49d8c r5:84554800 r4:84554800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84554800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc49e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85840040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84554800 r7:00000000 r6:83018000 r5:00001000 r4:7f441000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbd1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84cbef8c r4:84cbec00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84cbef8c r4:84df2380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84554800 r8:84df23ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84df2380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84df2380 r8:8027f5e8 r7:dfc41e60 r6:84df2400 r5:84554800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc49fb0 to 0xdfc49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84eecac0 INFO: task kworker/0:48:3219 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: c0185000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:49:3222 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:49 state:D stack:0 pid:3222 tgid:3222 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfc4dd84 r8:00000002 r7:60000113 r6:dfc4dd8c r5:84550c00 r4:84550c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84550c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc4de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84eecb40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84550c00 r7:00000000 r6:83018000 r5:00001000 r4:7f43f000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecadb000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84cbf38c r4:84cbf000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84cbf38c r4:84df2480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84550c00 r8:84df24ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84df2480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84df2480 r8:8027f5e8 r7:dfc49e60 r6:84df2500 r5:84550c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc4dfb0 to 0xdfc4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84eeccc0 INFO: task kworker/0:49:3222 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: c0470000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:50:3224 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:50 state:D stack:0 pid:3224 tgid:3224 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfc55d84 r8:00000002 r7:60000013 r6:dfc55d8c r5:83a06c00 r4:83a06c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a06c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc55e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84eecd80 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a06c00 r7:00000000 r6:83018000 r5:00001000 r4:7f43d000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5b1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84cbf78c r4:84cbf400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84cbf78c r4:84df2580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a06c00 r8:84df25ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84df2580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84df2580 r8:8027f5e8 r7:dfc4de60 r6:84df2600 r5:83a06c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc55fb0 to 0xdfc55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84eebf80 INFO: task kworker/0:50:3224 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: c06b4000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:51:3226 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:51 state:D stack:0 pid:3226 tgid:3226 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfc59d84 r8:00000002 r7:60000113 r6:dfc59d8c r5:84ec0000 r4:84ec0000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ec0000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc59e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85840700 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ec0000 r7:00000000 r6:83018000 r5:00001000 r4:7f43f000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec621000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84cbcf8c r4:84cbcc00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84cbcf8c r4:84df2680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ec0000 r8:84df26ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84df2680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84df2680 r8:8027f5e8 r7:dfc55e60 r6:84df2700 r5:84ec0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc59fb0 to 0xdfc59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84eebd40 INFO: task kworker/0:51:3226 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: c091c000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:52:3229 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:52 state:D stack:0 pid:3229 tgid:3229 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfc65d84 r8:00000002 r7:60000113 r6:dfc65d8c r5:84ec0c00 r4:84ec0c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ec0c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc65e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8583f3c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ec0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f4f5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed167000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84cbc78c r4:84cbc400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84cbc78c r4:84df2780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ec0c00 r8:84df27ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84df2780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84df2780 r8:8027f5e8 r7:dfc59e60 r6:84df2800 r5:84ec0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc65fb0 to 0xdfc65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e36100 INFO: task kworker/0:52:3229 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: c0a3d000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:53:3231 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:53 state:D stack:0 pid:3231 tgid:3231 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfc79d84 r8:00000002 r7:60000113 r6:dfc79d8c r5:84ec1800 r4:84ec1800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ec1800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc79e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b5c640 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ec1800 r7:00000000 r6:83018000 r5:00001000 r4:7f50f000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed23b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e9df8c r4:84e9dc00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e9df8c r4:84df2880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ec1800 r8:84df28ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84df2880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84df2880 r8:8027f5e8 r7:dfc65e60 r6:84df2900 r5:84ec1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc79fb0 to 0xdfc79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e36340 INFO: task kworker/0:53:3231 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: c0a3d000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:54:3234 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:54 state:D stack:0 pid:3234 tgid:3234 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfca1d84 r8:00000002 r7:60000113 r6:dfca1d8c r5:839f0c00 r4:839f0c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:839f0c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfca1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c251c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:839f0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed627000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e9e78c r4:84e9e400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e9e78c r4:84df2980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:839f0c00 r8:84df29ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84df2980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84df2980 r8:8027f5e8 r7:dfc79e60 r6:8461de80 r5:839f0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfca1fb0 to 0xdfca1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e36440 INFO: task kworker/0:54:3234 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: c0a3d000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:55:3236 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:55 state:D stack:0 pid:3236 tgid:3236 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfcb1d84 r8:00000002 r7:60000013 r6:dfcb1d8c r5:8451b000 r4:8451b000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8451b000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcb1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859f6400 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8451b000 r7:00000000 r6:83018000 r5:00001000 r4:7f5dd000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed3bb000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859e6f8c r4:859e6c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859e6f8c r4:84df2a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8451b000 r8:84df2a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84df2a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84df2a00 r8:8027f5e8 r7:dfca1e60 r6:83fe5800 r5:8451b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcb1fb0 to 0xdfcb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e364c0 INFO: task kworker/0:55:3236 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) dd20: c0dea000 edddd000 00000001 80239b98 7fb69000 00000001 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 INFO: task kworker/0:56:3237 blocked for more than 451 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfc85d84 r8:00000002 r7:60000113 r6:dfc85d8c r5:84ec2400 r4:84ec2400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ec2400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc85e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e36840 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ec2400 r7:00000000 r6:83018000 r5:00001000 r4:7f64b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd19000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e9ef8c r4:84e9ec00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e9ef8c r4:84df2a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ec2400 r8:84df2aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84df2a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84df2a80 r8:8027f5e8 r7:dfcb1e60 r6:84df2b00 r5:84ec2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc85fb0 to 0xdfc85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e364c0 INFO: task kworker/0:56:3237 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: c0dea000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:57:3239 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:57 state:D stack:0 pid:3239 tgid:3239 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfcbdd84 r8:00000002 r7:60000113 r6:dfcbdd8c r5:84ec3000 r4:84ec3000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ec3000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcbde08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:84e9f38c r4:84df2b80 dfa0: 00000000 00000000 00000000 00000000 r4:84e36800 Workqueue: events bpf_prog_free_deferred Exception stack(0xe883dd28 to 0xe883dd70) r5:80070013 r4:80239bb0 r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:84ec4800 r4:82918808 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ed631000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e36800 INFO: task kworker/0:58:3241 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: c137d000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:59:3242 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:59 state:D stack:0 pid:3242 tgid:3242 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfcd9d84 r8:00000002 r7:60000113 r6:dfcd9d8c r5:84ec6000 r4:84ec6000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ec6000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcd9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85050fc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:dfd0d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:859bf38c r4:84df2d80 Exception stack(0xdfcd9fb0 to 0xdfcd9ff8) r4:84e36c40 r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:82ac11a4 r4:00000000 r5:84fe978c r4:84fe9400 r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 INFO: task kworker/1:11:3244 blocked for more than 451 seconds. r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc51e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859fd400 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8451c800 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8d3000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a0f38c r4:85a0f000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a0f38c r4:84db0000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8451c800 r8:84db002c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84db0000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84db0000 r8:8027f5e8 r7:df9d5e60 r6:84db0080 r5:8451c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc51fb0 to 0xdfc51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ec9fc0 INFO: task kworker/1:11:3244 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: c1990000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:60:3247 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:60 state:D stack:0 pid:3247 tgid:3247 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfcd5d84 r8:00000002 r7:60000113 r6:dfcd5d8c r5:84519800 r4:84519800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84519800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcd5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a476c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:dfc99000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r5:84fe978c r4:84fe9400 r4:8454d880 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:12 state:D stack:0 pid:3248 tgid:3248 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8ef000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xdfcf9fb0 to 0xdfcf9ff8) task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11a4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:61:3251 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:61 state:D stack:0 pid:3251 tgid:3251 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfce5d84 r8:00000002 r7:60000113 r6:dfce5d8c r5:8451bc00 r4:8451bc00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8451bc00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfce5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85050880 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8451bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f75d000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed16b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859bfb8c r4:859bf800 r10:61c88647 r9:8451bc00 r8:84df2f2c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84518000 r4:82918808 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ec999000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r5:84fe978c r4:84fe9400 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e5a440 task:kworker/0:62 state:D stack:0 pid:3255 tgid:3255 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0f7000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859bf78c r4:859bf400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859bf78c r4:84df2f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8451ec00 r8:84df2fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84df2f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84df2f80 r8:8027f5e8 r7:dfcd9e60 r6:84db0400 r5:8451ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd25fb0 to 0xdfd25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84c085c0 INFO: task kworker/0:62:3255 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: c299d000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:63:3257 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Call trace: [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ed63b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:84c9b38c r4:84c09000 1fa0: 00000000 00000000 00000000 00000000 r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:82ac11a4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:844b9800 r4:82918808 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85050ec0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844b9800 r7:00000000 r6:83018000 r5:00001000 r4:7f6cb000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd01000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859bef8c r4:859bec00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859bef8c r4:84c09080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844b9800 r8:84c090ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84c09080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c09080 r8:8027f5e8 r7:dfd31e60 r6:84db0500 r5:844b9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd39fb0 to 0xdfd39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84c08440 INFO: task kworker/0:64:3258 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: c2dd7000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:65:3260 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:65 state:D stack:0 pid:3260 tgid:3260 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8291880c r9:dfd4dd84 r8:00000002 r7:60000113 r6:dfd4dd8c r5:838bbc00 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eda79000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd20: c3124000 edddd000 00000001 80239b98 7fb69000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:838b0c00 r4:82918808 r4:00000000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9b9000 r5:85a1838c r4:85a18000 r10:61c88647 r9:838b0c00 r8:84db062c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84c0f640 task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: c3124000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:66:3264 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:66 state:D stack:0 pid:3264 tgid:3264 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfd61d84 r8:00000002 r7:60000113 r6:dfd61d8c r5:838b2400 r4:838b2400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:838b2400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd61e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a5e700 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:838b2400 r7:00000000 r6:83018000 r5:00001000 r4:7f7e9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c5238c r4:85c52000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c5238c r4:84c09180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:838b2400 r8:84c091ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84c09180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c09180 r8:8027f5e8 r7:dfd31e60 r6:84db0700 r5:838b2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd61fb0 to 0xdfd61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84c08940 INFO: task kworker/0:66:3264 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: c35fc000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd79e08 r5:00001000 r4:ed6f5000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c51f8c r4:85c51c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c51f8c r4:84c09200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:838b0000 r8:84c0922c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84c09200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c09200 r8:8027f5e8 r7:dfd31e60 r6:84db0780 r5:838b0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd79fb0 to 0xdfd79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84c08980 INFO: task kworker/0:67:3266 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: c35fc000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:84518c00 r5:84518c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd89e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a5e400 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84518c00 r7:00000000 r6:83018000 r5:00001000 r4:7f7d1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eccf7000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c5178c r4:85c51400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c5178c r4:84c09280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84518c00 r8:84c092ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84c09280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c09280 r8:8027f5e8 r7:dfd31e60 r6:84db0800 r5:84518c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd89fb0 to 0xdfd89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84c08c40 task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 INFO: task kworker/0:69:3270 blocked for more than 452 seconds. [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r4:00000000 r5:00001000 r4:ed6a9000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r5:00001000 r4:e47a2000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:70 state:D stack:0 pid:3272 tgid:3272 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 r5:00001000 r4:dfd55000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: c3a34000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:71:3275 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:71 state:D stack:0 pid:3275 tgid:3275 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfdbdd84 r8:00000002 r7:60000013 r6:dfdbdd8c r5:84eb3000 r4:84eb3000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84eb3000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfdbde08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bfa680 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84eb3000 r7:00000000 r6:83018000 r5:00001000 r4:7f879000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edeb1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:84c9ab8c r4:84c09400 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r5:84fe978c r4:84fe9400 r4:8454d880 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84eb1800 r4:82918808 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:edc8b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84eb1800 r8:84c094ac r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfdd5d84 r8:00000002 r7:60000113 r6:dfdd5d8c r5:84eb0000 r4:84eb0000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84eb0000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfdd5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d40440 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84eb0000 r7:00000000 r6:83018000 r5:00001000 r4:7f8d9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee00b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4cb8c r4:85d4c800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d4cb8c r4:84c09500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84eb0000 r8:84c0952c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84c09500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c09500 r8:8027f5e8 r7:dfd31e60 r6:84db0a80 r5:84eb0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdd5fb0 to 0xdfdd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84dbb000 INFO: task kworker/0:73:3279 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: c439b000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:15:3281 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:15 state:D stack:0 pid:3281 tgid:3281 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfdb9d84 r8:00000002 r7:60000113 r6:dfdb9d8c r5:84eb3c00 r4:84eb3c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84eb3c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfdb9e08 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9fb000 r7:ddde2d80 r6:83018200 r5:85a18b8c r4:84db0b00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r5:84fe978c r4:84fe9400 r4:8454d880 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:74 state:D stack:0 pid:3284 tgid:3284 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfdf9e08 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee337000 r5:85d4d38c r4:85d4d000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84dbb240 INFO: task kworker/0:74:3284 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: c4ec1000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:75:3286 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:75 state:D stack:0 pid:3286 tgid:3286 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfe01d84 r8:00000002 r7:60000113 r6:dfe01d8c r5:84eb6c00 r4:84eb6c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84eb6c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe01e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bed7c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84eb6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f9e5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe21000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4e38c r4:85d4e000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca3d000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84eb2400 r8:84db0d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84db0d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84db0d00 r8:8027f5e8 r7:df9d5e60 r6:84db0d80 r5:84eb2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe0dfb0 to 0xdfe0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84db8140 INFO: task kworker/1:16:3287 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: c4ec1000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:76:3289 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:76 state:D stack:0 pid:3289 tgid:3289 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfe15d84 r8:00000002 r7:60000113 r6:dfe15d8c r5:84eb6000 r4:84eb6000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84eb6000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe15e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c0400 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84eb6000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa19000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e883ddc0 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8454d880 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfe19d84 r8:00000002 r7:60000013 r6:dfe19d8c r5:84eb4800 r4:84eb4800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84eb4800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe19e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bed6c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84eb4800 r7:00000000 r6:83018000 r5:00001000 r4:7f9e3000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edbfb000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4df8c r4:85d4dc00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d4df8c r4:84c09700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84eb4800 r8:84c0972c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84c09700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c09700 r8:8027f5e8 r7:dfe15e60 r6:84db0e80 r5:84eb4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe19fb0 to 0xdfe19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84dbb440 INFO: task kworker/0:77:3290 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: c53a0000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r4:e883ddc0 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e5a440 INFO: task kworker/0:78:3292 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:78 state:D stack:0 pid:3292 tgid:3292 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfe29d84 r8:00000002 r7:60000113 r6:dfe29d8c r5:84708c00 r4:84708c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84708c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe29e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bed5c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84708c00 r7:00000000 r6:83018000 r5:00001000 r4:7f9e1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edb73000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4db8c r4:85d4d800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d4db8c r4:84c09780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:84c09780 r8:8027f5e8 r7:dfe15e60 r6:84db0f00 r5:84708c00 task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad4 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r5:84fe978c r4:84fe9400 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e5a440 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda6b000 r5:85d4d78c r4:85d4d400 r10:61c88647 r9:84ec6c00 r8:84c0982c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 dd60: 80230ad4 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb43f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84db89c0 INFO: task kworker/1:17:3301 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: c5eab000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:18:3303 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:18 state:D stack:0 pid:3303 tgid:3303 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfa59d84 r8:00000002 r7:60000113 r6:dfa59d8c r5:84c18000 r4:84c18000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c18000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ecb65000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85a19f8c r4:85a19c00 r10:61c88647 r9:84c18000 r8:84e8102c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84db8b80 Workqueue: events bpf_prog_free_deferred dd60: 80230ad4 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb6d000 r7:ddde2d80 r6:83018200 r5:85a1a38c r4:84e81080 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:20:3308 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:20 state:D stack:0 pid:3308 tgid:3308 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfaa5d84 r8:00000002 r7:60000113 r6:dfaa5d8c r5:84c1a400 r4:84c1a400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c1a400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a06300 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84c1a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb75000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a1a78c r4:85a1a400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a1a78c r4:84e81100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c1a400 r8:84e8112c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e81100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e81100 r8:8027f5e8 r7:dfa41e60 r6:84c09c80 r5:84c1a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaa5fb0 to 0xdfaa5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84db8c80 INFO: task kworker/1:20:3308 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: c5eab000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 INFO: task kworker/1:21:3310 blocked for more than 452 seconds. r4:84c1bc00 r4:00000000 r4:00000000 r5:00001000 r4:dfb2b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85a1ab8c r4:84e81180 Exception stack(0xdfac5fb0 to 0xdfac5ff8) task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11a4 r4:00000000 r5:84fe978c r4:84fe9400 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 INFO: task kworker/1:22:3314 blocked for more than 452 seconds. r4:84c1c800 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:eaa0d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85a1af8c r4:84e81200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c1c800 r8:84e8122c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e81200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e81200 r8:8027f5e8 r7:dfa41e60 r6:84c09e80 r5:84c1c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaf5fb0 to 0xdfaf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84db8dc0 INFO: task kworker/1:22:3314 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: c63c9000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:23:3315 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:23 state:D stack:0 pid:3315 tgid:3315 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfb01d84 r8:00000002 r7:60000113 r6:dfb01d8c r5:84c1e000 r4:84c1e000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c1e000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb01e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a06600 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84c1e000 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 r5:00001000 r4:eb099000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85a1b38c r4:84e81280 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd20: c6bd5000 edddd000 00000001 80239b98 7fb69000 00000001 r4:e883ddc0 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8454d880 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb531000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84dbbb40 INFO: task kworker/1:24:3317 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: c6c4b000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:25:3320 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:25 state:D stack:0 pid:3320 tgid:3320 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfb25d84 r8:00000002 r7:60000113 r6:dfb25d8c r5:84ec5400 r4:84ec5400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ec5400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb25e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:eb661000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84ec5400 r8:84e813ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84dbbb40 [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r5:80070013 r4:80239bb0 r4:00000000 r5:84fe978c r4:84fe9400 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e5a440 task:kworker/1:26 state:D stack:0 pid:3322 tgid:3322 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:ecbf3000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85a2338c r4:84e81400 9fa0: 00000000 00000000 00000000 00000000 [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:27:3323 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:27 state:D stack:0 pid:3323 tgid:3323 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfae9d84 r8:00000002 r7:60000113 r6:dfae9d8c r5:8470a400 r4:8470a400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8470a400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a06a00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8470a400 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb835000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a1c38c r4:85a1c000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a1c38c r4:84e81480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8470a400 r8:84e814ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e81480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e81480 r8:8027f5e8 r7:dfb49e60 r6:84e81500 r5:8470a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84e5a440 r10:8291880c r9:dfb3dd84 r8:00000002 r7:60000013 r6:dfb3dd8c r5:8470b000 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ecbcf000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84e81580 r8:8027f5e8 r7:dfb49e60 r6:84e81600 r5:8470b000 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84db62c0 INFO: task kworker/1:28:3327 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: c79b0000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:29:3328 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:29 state:D stack:0 pid:3328 tgid:3328 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfa09d84 r8:00000002 r7:60000013 r6:dfa09d8c r5:8470bc00 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:ec71b000 r7:ddde2d80 r6:83018200 r5:85a1eb8c r4:84e81680 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r5:00001000 r4:e47a2000 r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb69e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d9b280 r5:00001000 r4:ecbe7000 r5:85a22f8c r4:85a22c00 r10:61c88647 r9:8470c800 r8:84e817ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 dd60: 80230ad4 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:31:3332 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:31 state:D stack:0 pid:3332 tgid:3332 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfb95d84 r8:00000002 r7:60000013 r6:dfb95d8c r5:8470d400 r4:8470d400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8470d400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb95e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d9b040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8470d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbdb000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a22b8c r4:85a22800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a22b8c r4:84e81900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8470d400 r8:84e8192c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e81900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e81900 r8:8027f5e8 r7:dfb3de60 r6:84e81980 r5:8470d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb95fb0 to 0xdfb95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84db6680 INFO: task kworker/1:31:3332 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: c82ec000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 r5:00001000 r4:e47a2000 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:8470e000 r4:82918808 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:ecb93000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85a2138c r4:84e81a00 Exception stack(0xdfbadfb0 to 0xdfbadff8) r4:84db68c0 [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbc5e08 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbc3000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a2238c r4:85a22000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a2238c r4:84e81b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8470ec00 r8:84e81b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e81b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e81b00 r8:8027f5e8 r7:dfbade60 r6:84e81b80 r5:8470ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbc5fb0 to 0xdfbc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84db6b00 INFO: task kworker/1:33:3336 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: c8767000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:34:3338 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:34 state:D stack:0 pid:3338 tgid:3338 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfbe5d84 r8:00000002 r7:60000013 r6:dfbe5d8c r5:84709800 r4:84709800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84709800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a05e00 r5:00001000 r4:ecbab000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85a21b8c r4:84e81c00 5fa0: 00000000 00000000 00000000 00000000 [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11a4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a05f00 r5:00001000 r4:ecbb7000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84e81d00 r8:8027f5e8 r7:dfbe5e60 r6:84e81d80 r5:84708000 task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11a4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:36:3343 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:36 state:D stack:0 pid:3343 tgid:3343 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfbf1d84 r8:00000002 r7:60000013 r6:dfbf1d8c r5:838b3000 r4:838b3000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:838b3000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a05d00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:838b3000 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb9f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a2178c r4:85a21400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a2178c r4:84e81e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:838b3000 r8:84e81e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e81e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e81e00 r8:8027f5e8 r7:dfbe5e60 r6:84e81e80 r5:838b3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbf1fb0 to 0xdfbf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84df6000 INFO: task kworker/1:36:3343 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: c8e7b000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:8291880c r9:dfc31d84 r8:00000002 r7:60000013 r6:dfc31d8c r5:84d08000 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:ecb87000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:38:3345 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:38 state:D stack:0 pid:3345 tgid:3345 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfc0dd84 r8:00000002 r7:60000013 r6:dfc0dd8c r5:84d08c00 r4:84d08c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d08c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc0de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a05340 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84d08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec755000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a1ef8c r4:85a1ec00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a1ef8c r4:84e30000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d08c00 r8:84e3002c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e30000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e30000 r8:8027f5e8 r7:dfc31e60 r6:84e30080 r5:84d08c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc0dfb0 to 0xdfc0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84df6340 INFO: task kworker/1:38:3345 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) dd20: c92bd000 edddd000 00000001 80239b98 7fb69000 00000001 r4:00000000 r5:84fe978c r4:84fe9400 r4:8454d880 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec547000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: c97ec000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 r5:84fe978c r4:84fe9400 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ecadd000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11a4 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e5a440 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe71e08 r9:83018205 r8:84c42400 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 r5:00001000 r4:ecabd000 r7:ddde2d80 r6:83018200 r5:85a2078c r4:84e30280 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84df6500 INFO: task kworker/1:41:3351 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: c9cfd000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:42:3353 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:42 state:D stack:0 pid:3353 tgid:3353 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfe85d84 r8:00000002 r7:60000013 r6:dfe85d8c r5:84c43000 r4:84c43000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c43000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe85e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a05840 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca11000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85a2038c r4:84e30200 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd60: 80230ad4 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec885000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a1ff8c r4:85a1fc00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a1ff8c r4:84e30300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c44800 r8:84e3032c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e30300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e30300 r8:8027f5e8 r7:dfe59e60 r6:84c0c300 r5:84c44800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe99fb0 to 0xdfe99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84df6980 INFO: task kworker/1:43:3356 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: c9fff000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:44:3357 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Call trace: [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec867000 r5:85a1fb8c r4:85a1f800 r10:61c88647 r9:84c45400 r8:84e303ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e883ddc0 r5:00001000 r4:e47a2000 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:45 state:D stack:0 pid:3359 tgid:3359 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dfeb5d84 r8:00000002 r7:60000013 r6:dfeb5d8c r5:84c46000 r4:84c46000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c46000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfeb5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a05540 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84c46000 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec839000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a1f78c r4:85a1f400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a1f78c r4:84e30400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c46000 r8:84e3042c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e30400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e30400 r8:8027f5e8 r7:dfe59e60 r6:84c0c400 r5:84c46000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfeb5fb0 to 0xdfeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84df69c0 INFO: task kworker/1:45:3359 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: c9fff000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r4:82ac11a4 r4:00000000 r5:84fe978c r4:84fe9400 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e5a440 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec827000 r5:85a1f38c r4:85a1f000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a1f38c r4:84e30480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c70000 r8:84e304ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e30480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e30480 r8:8027f5e8 r7:dfe59e60 r6:84c0c480 r5:84c70000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfec5fb0 to 0xdfec5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84df6b40 INFO: task kworker/1:46:3361 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: ca582000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfed5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859fde80 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84c71800 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec571000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a1e38c r4:85a1e000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a1e38c r4:84e30500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c71800 r8:84e3052c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e30500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e30500 r8:8027f5e8 r7:dfe59e60 r6:84c0c500 r5:84c71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfed5fb0 to 0xdfed5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r5:84fe978c r4:84fe9400 r4:8454d880 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6af000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd60: 80230ad4 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:8291880c r9:dfeedd84 r8:00000002 r7:60000013 r6:dfeedd8c r5:84c70c00 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:ec4fb000 r5:85a1d78c r4:85a1d400 r10:61c88647 r9:84c70c00 r8:84e3062c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84db6fc0 [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: caab4000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:50:3369 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:50 state:D stack:0 pid:3369 tgid:3369 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dff01d84 r8:00000002 r7:60000113 r6:dff01d8c r5:84c74800 r4:84c74800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c74800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff01e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a06d00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84c74800 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba9d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84c74800 r8:84e306ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11a4 r4:00000000 r5:84fe978c r4:84fe9400 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff0de08 r9:83018205 r8:84c73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 r5:00001000 r4:eba31000 r7:ddde2d80 r6:83018200 r5:85a1cb8c r4:84e30700 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:82ac11a4 r4:00000000 r5:84fe978c r4:84fe9400 r4:8454d880 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:52 state:D stack:0 pid:3372 tgid:3372 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:dff15d84 r8:00000002 r7:60000013 r6:dff15d8c r5:84c76000 r4:84c76000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c76000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff15e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859fdf40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84c76000 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec515000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a1db8c r4:85a1d800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a1db8c r4:84e30780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c76000 r8:84e307ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e30780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e30780 r8:8027f5e8 r7:dfeede60 r6:84c0c780 r5:84c76000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff15fb0 to 0xdff15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d5c000 INFO: task kworker/1:52:3372 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: caeba000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ebafb000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84d0c800 r8:84e3092c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84d5c480 Workqueue: events bpf_prog_free_deferred dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:203:3760 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:203 state:D stack:0 pid:3760 tgid:3760 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:e0671d84 r8:00000002 r7:60000113 r6:e0671d8c r5:84f78000 r4:84f78000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f78000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0671e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:e47bd000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84f78000 r8:84ce092c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 Exception stack(0xe883dfb0 to 0xe883dff8) Not tainted 6.15.0-syzkaller #0 r5:8501d400 r4:82918808 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:e8843000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:84fe9b8c r4:8454d780 Exception stack(0xe47b9fb0 to 0xe47b9ff8) task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11a4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8841e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d62f80 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85020c00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe03000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8454a38c r4:8454a000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8454a38c r4:84e83a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020c00 r8:84e83a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e83a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e83a00 r8:8027f5e8 r7:e0671e60 r6:8454d980 r5:85020c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8841fb0 to 0xe8841ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8479bb80 INFO: task kworker/0:206:3873 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: cbaa6000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:173:3877 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:173 state:D stack:0 pid:3877 tgid:3877 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:e8839d84 r8:00000002 r7:60000113 r6:e8839d8c r5:85021800 r4:85021800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85021800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8839e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5aec0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85021800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e885b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fea38c r4:84fea000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fea38c r4:8454da00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85021800 r8:8454da2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454da00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454da00 r8:8027f5e8 r7:e47b9e60 r6:8454da80 r5:85021800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8839fb0 to 0xe8839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa00 INFO: task kworker/1:173:3877 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: cbecf000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:174:3878 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:174 state:D stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:e884dd84 r8:00000002 r7:60000113 r6:e884dd8c r5:85022400 r4:85022400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85022400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e884de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 INFO: task kworker/1:174:3878 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: cbecf000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84e5a440 Not tainted 6.15.0-syzkaller #0 task:kworker/1:175 state:D stack:0 pid:3881 tgid:3881 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:85023000 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:dfacd000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 dd20: cc2e7000 edddd000 00000001 80239b98 7fb69000 00000001 r5:80070013 r4:80239bb0 r4:82ac11a4 r4:e883ddc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:176:3882 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:176 state:D stack:0 pid:3882 tgid:3882 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:e8835d84 r8:00000002 r7:60000013 r6:e8835d8c r5:85023c00 r4:85023c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85023c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8835e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5a780 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85023c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8867000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fea78c r4:84fea400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fea78c r4:8454dd80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85023c00 r8:8454ddac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454dd80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454dd80 r8:8027f5e8 r7:e8859e60 r6:8454de00 r5:85023c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8835fb0 to 0xe8835ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5ae80 INFO: task kworker/1:176:3882 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: cc5a8000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:177:3885 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:177 state:D stack:0 pid:3885 tgid:3885 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:e0635d84 r8:00000002 r7:60000113 r6:e0635d8c r5:85024800 r4:85024800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85024800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0635e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847140c0 r5:00001000 r4:df9b2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) dd20: cc5a8000 edddd000 00000001 80239b98 7fb69000 00000001 r5:80070013 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:00000000 r5:00001000 r4:e47a2000 r5:84fe978c r4:84fe9400 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:178:3886 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:178 state:D stack:0 pid:3886 tgid:3886 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:e8865d84 r8:00000002 r7:60000113 r6:e8865d8c r5:85026000 r4:85026000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85026000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8865e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84714400 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85026000 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa17000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84feb38c r4:84feb000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84feb38c r4:8454df80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85026000 r8:8454dfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454df80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454df80 r8:8027f5e8 r7:e8859e60 r6:8454dc00 r5:85026000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8865fb0 to 0xe8865ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84714280 INFO: task kworker/1:178:3886 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: cc5a8000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:179:3889 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:dfa4d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84feb78c r4:84feb400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84feb78c r4:84e32f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501ec00 r8:84e32fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e32f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e32f80 r8:8027f5e8 r7:e8859e60 r6:84712000 r5:8501ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe063dfb0 to 0xe063dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84714500 INFO: task kworker/1:179:3889 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: cc916000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:180:3891 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:180 state:D stack:0 pid:3891 tgid:3891 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:e0639d84 r8:00000002 r7:60000013 r6:e0639d8c r5:8501e000 r4:8501e000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8501e000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0639e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84714800 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501e000 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa71000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84febb8c r4:84feb800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84febb8c r4:84712080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501e000 r8:847120ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84712080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84712080 r8:8027f5e8 r7:e8859e60 r6:84712100 r5:8501e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84714840 INFO: task kworker/1:180:3891 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: cc916000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:181:3893 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:181 state:D stack:0 pid:3893 tgid:3893 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:e8871d84 r8:00000002 r7:60000113 r6:e8871d8c r5:85026c00 r4:85026c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85026c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8871e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84714a80 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85026c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb31000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ff438c r4:84ff4000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ff438c r4:84712180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85026c00 r8:847121ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84712180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84712180 r8:8027f5e8 r7:e8859e60 r6:84712200 r5:85026c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84714700 INFO: task kworker/1:181:3893 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: cd2ec000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-syzkaller #0 r4:85025400 r4:00000000 r4:00000000 r5:00001000 r4:dfb7d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:84ff478c r4:84712280 Exception stack(0xe0669fb0 to 0xe0669ff8) r4:84714880 r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:82ac11a4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:85030000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 r5:00001000 r4:dfbcf000 r7:ddde2d80 r6:83018200 r5:84ff4b8c r4:84712380 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:184:3899 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:184 state:D stack:0 pid:3899 tgid:3899 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:e06c9d84 r8:00000002 r7:60000113 r6:e06c9d8c r5:85030c00 r4:85030c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85030c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06c9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c240c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85030c00 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe37000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ff538c r4:84ff5000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ff538c r4:84712480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85030c00 r8:847124ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84712480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84712480 r8:8027f5e8 r7:e0699e60 r6:84712500 r5:85030c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84714c80 INFO: task kworker/1:184:3899 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: cd5ce000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06f5e08 r5:00001000 r4:dfc15000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd60: 80230ad4 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 Exception stack(0xe883dfb0 to 0xe883dff8) INFO: task kworker/0:207:3903 blocked for more than 453 seconds. r5:85031800 r4:82918808 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:e0685000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85031800 r8:84e83aac r7:82804d40 r6:dddced80 r5:dddceda0 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8479b6c0 INFO: task kworker/0:207:3903 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: cda10000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:186:3905 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:186 state:D stack:0 pid:3905 tgid:3905 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:e0705d84 r8:00000002 r7:60000113 r6:e0705d8c r5:85033c00 r4:85033c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85033c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:dfe5b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84ff578c r4:84ff5400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84c24000 [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11a4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06d9e08 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe8d000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe06d9fb0 to 0xe06d9ff8) task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11a4 r4:00000000 r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:188:3909 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:188 state:D stack:0 pid:3909 tgid:3909 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:e0751d84 r8:00000002 r7:60000113 r6:e0751d8c r5:85035400 r4:85035400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85035400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0751e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c24800 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85035400 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee9000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ff638c r4:84ff6000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ff638c r4:84712900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85035400 r8:8471292c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84712900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84712900 r8:8027f5e8 r7:e06d9e60 r6:84712980 r5:85035400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0751fb0 to 0xe0751ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84c24580 INFO: task kworker/1:188:3909 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: cde28000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/1:189 state:D stack:0 pid:3911 tgid:3911 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:dfebf000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: ce5e2000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:190:3913 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:190 state:D stack:0 pid:3913 tgid:3913 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:85036c00 r4:00000000 r4:00000000 r5:00001000 r4:e06bd000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84ff6f8c r4:84ff6c00 r10:61c88647 r9:85036c00 r8:84712b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e883ddc0 r5:00001000 r4:e47a2000 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:191:3914 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:191 state:D stack:0 pid:3914 tgid:3914 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ea889d84 r8:00000002 r7:60000013 r6:ea889d8c r5:85033000 r4:85033000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85033000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea889e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c249c0 r4:00000000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e065b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:84ff678c r4:84712c00 Exception stack(0xea889fb0 to 0xea889ff8) task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11a4 r4:00000000 r5:84fe978c r4:84fe9400 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e5a440 task:kworker/1:192 state:D stack:0 pid:3917 tgid:3917 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:e069d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:8291880c r9:ea88dd84 r8:00000002 r7:60000113 r6:ea88dd8c r5:84f8bc00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea88de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8459a680 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f8bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0709000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fc878c r4:84fc8400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fc878c r4:84e83b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84f8bc00 r8:84e83b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e83b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e83b00 r8:8027f5e8 r7:e0671e60 r6:84e83b80 r5:84f8bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea88dfb0 to 0xea88dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8459a2c0 INFO: task kworker/0:208:3919 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: cf062000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8454d880 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06d5000 r5:84ff738c r4:84ff7000 r4:84712e00 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd20: cf062000 edddd000 00000001 80239b98 7fb69000 00000001 r4:00000000 r5:84fe978c r4:84fe9400 r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:194:3923 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:194 state:D stack:0 pid:3923 tgid:3923 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ea89dd84 r8:00000002 r7:60000013 r6:ea89dd8c r5:85038c00 r4:85038c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85038c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea89de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84599540 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85038c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0723000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ff7b8c r4:84ff7800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ff7b8c r4:84712e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85038c00 r8:84712eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84712e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84712e80 r8:8027f5e8 r7:ea899e60 r6:84712f00 r5:85038c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea89dfb0 to 0xea89dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d99500 INFO: task kworker/1:194:3923 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: cf062000 edddd000 00000001 80239b98 7fb69000 00000001 r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:195 state:D stack:0 pid:3925 tgid:3925 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:e06f7000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:209:3928 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:209 state:D stack:0 pid:3928 tgid:3928 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ea8a5d84 r8:00000002 r7:60000113 r6:ea8a5d8c r5:8503a400 r4:8503a400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8503a400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8a5e08 r4:00000000 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:e05cb000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84fc8f8c r4:84fc8c00 r4:84e83c80 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:196 state:D stack:0 pid:3929 tgid:3929 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84599680 r5:00001000 r4:e0739000 r5:84ff7f8c r4:84ff7c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd20: cf8ed000 edddd000 00000001 80239b98 7fb69000 00000001 r4:e883ddc0 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8454d880 dfa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:197 state:D stack:0 pid:3931 tgid:3931 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ea8b1d84 r8:00000002 r7:60000113 r6:ea8b1d8c r5:84f8e000 r4:84f8e000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f8e000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8b1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845997c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84f8e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea8b3000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8500438c r4:85004000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8500438c r4:84c5e180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84f8e000 r8:84c5e1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84c5e180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c5e180 r8:8027f5e8 r7:ea8a9e60 r6:84e83d80 r5:84f8e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8b1fb0 to 0xea8b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84599500 INFO: task kworker/1:197:3931 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: cf8ed000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ea8c7000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8500478c r4:84c5e200 5fa0: 00000000 00000000 00000000 00000000 [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11a4 r4:00000000 r5:84fe978c r4:84fe9400 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e5a440 task:kworker/1:199 state:D stack:0 pid:3935 tgid:3935 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:ea90b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8500578c r4:84c5e280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84f89800 r8:84c5e2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84c5e280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c5e280 r8:8027f5e8 r7:ea8c5e60 r6:84e83e80 r5:84f89800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8d5fb0 to 0xea8d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84599840 INFO: task kworker/1:199:3935 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: cfcef000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:200:3936 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:200 state:D stack:0 pid:3936 tgid:3936 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ea8e5d84 r8:00000002 r7:60000113 r6:ea8e5d8c r5:84f8b000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84599ac0 r5:00001000 r4:ea8d7000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e883ddc0 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8454d880 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:ea8eb000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85004f8c r4:84c5e380 9fa0: 00000000 00000000 00000000 00000000 [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) dd20: d0682000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:202:3940 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:202 state:D stack:0 pid:3940 tgid:3940 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ea8fdd84 r8:00000002 r7:60000113 r6:ea8fdd8c r5:84f91800 r4:84f91800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f91800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8fde08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84599d00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84f91800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea8ff000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8500538c r4:85005000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8500538c r4:84c5e400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84f91800 r8:84c5e42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84c5e400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c5e400 r8:8027f5e8 r7:ea8d5e60 r6:8505d000 r5:84f91800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8fdfb0 to 0xea8fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:845999c0 INFO: task kworker/1:202:3940 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:84f90000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea919e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d99840 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84f90000 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea93b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8500638c r4:85006000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8500638c r4:84c5e480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84f90000 r8:84c5e4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84c5e480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c5e480 r8:8027f5e8 r7:ea8d5e60 r6:8505d080 r5:84f90000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea919fb0 to 0xea919ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84599cc0 INFO: task kworker/1:203:3943 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: d08b0000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:00000000 r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 r4:00000001 r4:84e5a440 task:kworker/1:204 state:D stack:0 pid:3944 tgid:3944 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r9:83018205 r8:84f92400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 r5:00001000 r4:ea91b000 r7:ddde2d80 r6:83018200 r5:85005b8c r4:84c5e500 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84599e80 INFO: task kworker/1:204:3944 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: d0c76000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 INFO: task kworker/1:205:3947 blocked for more than 453 seconds. r10:8291880c r9:ea945d84 r8:00000002 r7:60000013 r6:ea945d8c r5:84f93000 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:ea92f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85005f8c r4:85005c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85005f8c r4:84c5e580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84f93000 r8:84c5e5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84c5e580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c5e580 r8:8027f5e8 r7:ea919e60 r6:8505d180 r5:84f93000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea945fb0 to 0xea945ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84c24e40 INFO: task kworker/1:205:3947 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd20: d0f74000 edddd000 00000001 80239b98 7fb69000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e5a440 task:kworker/1:206 state:D stack:0 pid:3949 tgid:3949 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:ea94f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8500678c r4:85006400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8500678c r4:84c5e600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84f93c00 r8:84c5e62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84c5e600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c5e600 r8:8027f5e8 r7:ea919e60 r6:8505d200 r5:84f93c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea955fb0 to 0xea955ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84599300 INFO: task kworker/1:206:3949 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: d0f74000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ea95f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85006b8c r4:85006800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85006b8c r4:84c5e680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84f95400 r8:84c5e6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84c5e680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c5e680 r8:8027f5e8 r7:ea955e60 r6:8505d280 r5:84f95400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea95dfb0 to 0xea95dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85065080 INFO: task kworker/1:207:3951 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: d0f74000 edddd000 00000001 80239b98 7fb69000 00000001 r4:e883ddc0 r5:00001000 r4:e47a2000 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe883dfb0 to 0xe883dff8) Not tainted 6.15.0-syzkaller #0 r10:8291880c r9:ea969d84 r8:00000002 r7:60000113 r6:ea969d8c r5:84f96000 r4:00000000 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85065480 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84f96000 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df83d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85006f8c r4:85006c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85006f8c r4:84c5e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84f96000 r8:84c5e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84c5e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c5e700 r8:8027f5e8 r7:ea95de60 r6:8505d300 r5:84f96000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea969fb0 to 0xea969ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850651c0 INFO: task kworker/1:208:3952 is blocked on a mutex likely owned by task kworker/1:172:3871. dd20: d137d000 edddd000 00000001 80239b98 7fb69000 00000001 r4:e883ddc0 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 Not tainted 6.15.0-syzkaller #0 r4:84f96c00 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850655c0 r5:00001000 r4:df995000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe8805fb0 to 0xe8805ff8) task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11a4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8503bc00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea891e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85065a80 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8503bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcfb000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85007f8c r4:85007c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85007f8c r4:84c5e800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8503bc00 r8:84c5e82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84c5e800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c5e800 r8:8027f5e8 r7:e8805e60 r6:84c5e880 r5:8503bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea891fb0 to 0xea891ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85065440 INFO: task kworker/1:210:3957 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: d1cff000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8503d400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8ade08 r5:00001000 r4:dfc6f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8500778c r4:84c5e900 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11a4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:212:3961 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:212 state:D stack:0 pid:3961 tgid:3961 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:e8825d84 r8:00000002 r7:60000113 r6:e8825d8c r5:8503e000 r4:8503e000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8503e000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8825e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850658c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8503e000 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfccf000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85007b8c r4:85007800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85007b8c r4:84c5ea00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8503e000 r8:84c5ea2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84c5ea00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c5ea00 r8:8027f5e8 r7:ea891e60 r6:84c5ea80 r5:8503e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8825fb0 to 0xe8825ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85065800 INFO: task kworker/1:212:3961 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: d1cff000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 INFO: task kworker/1:213:3965 blocked for more than 453 seconds. r4:8503ec00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8849e08 r5:00001000 r4:dfd7f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8500878c r4:84c5eb00 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd33000 r7:ddde2d80 r6:83018200 r5:8500838c r4:84c5ec00 r10:00000000 r9:84c5ec00 r8:8027f5e8 r7:e8849e60 r6:84c5ec80 r5:8503c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8861fb0 to 0xe8861ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85065980 INFO: task kworker/1:214:3966 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: d2408000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:215:3968 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:215 state:D stack:0 pid:3968 tgid:3968 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ea96dd84 r8:00000002 r7:60000013 r6:ea96dd8c r5:8503b000 r4:8503b000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r4:00000000 r9:83018205 r8:8503b000 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 r5:00001000 r4:dfdbf000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85008b8c r4:84c5ed00 Exception stack(0xea96dfb0 to 0xea96dff8) task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11a4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 r9:83018205 r8:85040000 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 r5:00001000 r4:dff4d000 r5:8500978c r4:85009400 r4:84c5ee00 dfa0: 00000000 00000000 00000000 00000000 r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:82ac11a4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:217:3971 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:217 state:D stack:0 pid:3971 tgid:3971 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:e8855d84 r8:00000002 r7:60000113 r6:e8855d8c r5:85040c00 r4:85040c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85040c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8855e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8459a080 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85040c00 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfde3000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85008f8c r4:85008c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85008f8c r4:84c5ef00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85040c00 r8:84c5ef2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84c5ef00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c5ef00 r8:8027f5e8 r7:e886de60 r6:84c5ef80 r5:85040c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8855fb0 to 0xe8855ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85065d80 INFO: task kworker/1:217:3971 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: d25b8000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:dff0f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8500938c r4:85074000 r10:61c88647 r9:85041800 r8:8507402c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85074000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85074000 r8:8027f5e8 r7:e886de60 r6:85074080 r5:85041800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea971fb0 to 0xea971ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8506e000 INFO: task kworker/1:218:3974 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: d29ac000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:85042400 r4:82918808 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:e000b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8500a38c r4:8500a000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8500a38c r4:85074100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85042400 r8:8507412c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85074100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85074100 r8:8027f5e8 r7:e886de60 r6:85074180 r5:85042400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea985fb0 to 0xea985ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8506e240 INFO: task kworker/1:219:3977 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: d2e1f000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85043000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea975e08 r5:00001000 r4:dff95000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85043000 r8:8507422c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:82ac11a4 r4:00000000 r5:84fe978c r4:84fe9400 r4:8454d880 r4:00000001 r4:84e5a440 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:dffd1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85009f8c r4:85009c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85009f8c r4:85074300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85043c00 r8:8507432c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85074300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85074300 r8:8027f5e8 r7:ea985e60 r6:85074380 r5:85043c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea989fb0 to 0xea989ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8506e380 INFO: task kworker/1:221:3981 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: d32dd000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:8291880c r9:ea98dd84 r8:00000002 r7:60000113 r6:ea98dd8c r5:85044800 r4:00000000 r4:00000000 r5:00001000 r4:e006b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85044800 r8:8507442c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 Not tainted 6.15.0-syzkaller #0 r4:85045400 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:e03af000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85074500 r8:8027f5e8 r7:ea98de60 r6:85074580 r5:85045400 task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11a4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:224:3986 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:224 state:D stack:0 pid:3986 tgid:3986 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ea995d84 r8:00000002 r7:60000013 r6:ea995d8c r5:85046000 r4:85046000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85046000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea995e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506e940 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85046000 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e008b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8500ab8c r4:8500a800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8500ab8c r4:85074600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85046000 r8:8507462c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85074600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85074600 r8:8027f5e8 r7:ea991e60 r6:85074680 r5:85046000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea995fb0 to 0xea995ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8506e7c0 INFO: task kworker/1:224:3986 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: d3720000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ea99dd84 r8:00000002 r7:60000113 r6:ea99dd8c r5:85046c00 r4:85046c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85046c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea99de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506ec40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:e03c7000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:82ac11a4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:85048000 r4:82918808 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:e03df000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85048000 r8:8507482c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8506e8c0 Call trace: dd20: d3e8b000 edddd000 00000001 80239b98 7fb69000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:227:3993 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:227 state:D stack:0 pid:3993 tgid:3993 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ea9a1d84 r8:00000002 r7:60000113 r6:ea9a1d8c r5:85048c00 r4:85048c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85048c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9a1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506ef40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85048c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e048d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8500bb8c r4:8500b800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8500bb8c r4:85074900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85048c00 r8:8507492c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85074900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85074900 r8:8027f5e8 r7:ea999e60 r6:85074980 r5:85048c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9a1fb0 to 0xea9a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8506ebc0 INFO: task kworker/1:227:3993 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e0539000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8500bf8c r4:85074a00 Exception stack(0xea9a5fb0 to 0xea9a5ff8) r4:8506ebc0 INFO: task kworker/1:228:3994 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: d3e8b000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:229:3996 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:229 state:D stack:0 pid:3996 tgid:3996 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ea9a9d84 r8:00000002 r7:60000013 r6:ea9a9d8c r5:8504a400 r4:8504a400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8504a400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9a9e08 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:e0575000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8501438c r4:85014000 r4:85074b00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:e883ddc0 r5:00001000 r4:e47a2000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e058b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8501478c r4:85014400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8501478c r4:85074c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8504b000 r8:85074c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85074c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85074c00 r8:8027f5e8 r7:ea9a9e60 r6:85074c80 r5:8504b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9adfb0 to 0xea9adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85089100 INFO: task kworker/1:230:3998 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: d4232000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:231:4000 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:231 state:D stack:0 pid:4000 tgid:4000 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ea9b1d84 r8:00000002 r7:60000013 r6:ea9b1d8c r5:8504bc00 r4:8504bc00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8504bc00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9b1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85089580 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8504bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05a3000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85014b8c r4:85014800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85014b8c r4:85074d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8504bc00 r8:85074d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85074d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85074d00 r8:8027f5e8 r7:ea9ade60 r6:85074d80 r5:8504bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9b1fb0 to 0xea9b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85089340 INFO: task kworker/1:231:4000 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r5:80070013 r4:80239bb0 r4:e883ddc0 r5:00001000 r4:e47a2000 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e0601000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:8501538c r4:85074e00 Exception stack(0xea9b5fb0 to 0xea9b5ff8) task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11a4 r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8504d400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9bde08 r5:00001000 r4:e05e3000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85014f8c r4:85074f00 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9bdfb0 to 0xea9bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850893c0 INFO: task kworker/1:233:4003 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: d4b63000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:210:4005 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 task:kworker/0:210 state:D stack:0 pid:4005 tgid:4005 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r9:83018005 r8:84e79800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c7000 r5:00001000 r4:eaa83000 r5:84fc9b8c r4:84fc9800 r4:8505d400 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r4:84e5a440 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e062b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8501578c r4:850cb000 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: d4f51000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:235:4010 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:235 state:D stack:0 pid:4010 tgid:4010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ea9d5d84 r8:00000002 r7:60000113 r6:ea9d5d8c r5:84e7bc00 r4:84e7bc00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e7bc00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9d5e08 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47d1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8501638c r4:850cb080 Exception stack(0xea9d5fb0 to 0xea9d5ff8) task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11a4 r4:00000000 r5:84fe978c r4:84fe9400 r4:8454d880 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e076d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85015b8c r4:850cb100 9fa0: 00000000 00000000 00000000 00000000 r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:82ac11a4 r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:237:4013 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:237 state:D stack:0 pid:4013 tgid:4013 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ea9e5d84 r8:00000002 r7:60000113 r6:ea9e5d8c r5:84e7b000 r4:84e7b000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e7b000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9e5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85089e80 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84e7b000 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a9000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85015f8c r4:85015c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85015f8c r4:850cb180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e7b000 r8:850cb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850cb180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850cb180 r8:8027f5e8 r7:ea9d5e60 r6:8505d680 r5:84e7b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9e5fb0 to 0xea9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85089b40 INFO: task kworker/1:237:4013 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: d5c18000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e880f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85016f8c r4:85016c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85016f8c r4:850cb200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e7c800 r8:850cb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850cb200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850cb200 r8:8027f5e8 r7:ea9d5e60 r6:8505d700 r5:84e7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9edfb0 to 0xea9edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85089c80 INFO: task kworker/1:238:4015 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: d5c18000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eaa7b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe883dd28 to 0xe883dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e7e000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9fde08 r5:00001000 r4:e47e1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8501678c r4:850cb280 Exception stack(0xea9fdfb0 to 0xea9fdff8) task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:240:4021 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:240 state:D stack:0 pid:4021 tgid:4021 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eaa01d84 r8:00000002 r7:60000013 r6:eaa01d8c r5:84e7d400 r4:84e7d400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e7d400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa01e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85089700 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84e7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47f1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85016b8c r4:85016800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85016b8c r4:850cb300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e7d400 r8:850cb32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850cb300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850cb300 r8:8027f5e8 r7:ea9ede60 r6:8505d900 r5:84e7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa01fb0 to 0xeaa01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85089e00 INFO: task kworker/1:240:4021 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: d659f000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8454d880 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eaacf000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:850cb400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850cb400 r8:8027f5e8 r7:ea9ede60 r6:8505d980 r5:84e78c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa09fb0 to 0xeaa09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850da100 INFO: task kworker/1:241:4023 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: d659f000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: r5:84f94800 r4:82918808 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:e8845000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8501738c r4:850cb380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84f94800 r8:850cb3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850cb380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850cb380 r8:8027f5e8 r7:eaa09e60 r6:8505da00 r5:84f94800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa11fb0 to 0xeaa11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850da200 INFO: task kworker/1:242:4025 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: d6970000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:84fe978c r4:84fe9400 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84cd5400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa19e08 r5:00001000 r4:e8875000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84cd5400 r8:850cb4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850da140 Call trace: dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 r4:00000000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850da580 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84f98c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea979000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85017b8c r4:85017800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85017b8c r4:850cb500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84f98c00 r8:850cb52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850cb500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850cb500 r8:8027f5e8 r7:eaa09e60 r6:8505db00 r5:84f98c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa25fb0 to 0xeaa25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850da240 INFO: task kworker/1:244:4029 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: d6970000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa2b000 r5:85017f8c r4:85017c00 r10:00000000 r9:850cb580 r8:8027f5e8 r7:eaa09e60 r6:8505db80 r5:84f98000 r4:850da340 INFO: task kworker/1:245:4031 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: d6cc2000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:246:4033 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:246 state:D stack:0 pid:4033 tgid:4033 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:84f9b000 [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eaa3b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:8510838c r4:850cb600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84f9b000 r8:850cb62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850cb600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850cb600 r8:8027f5e8 r7:eaa09e60 r6:8505dc00 r5:84f9b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa45fb0 to 0xeaa45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850da700 INFO: task kworker/1:246:4033 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: d6edd000 edddd000 00000001 80239b98 7fb69000 00000001 r4:e883ddc0 r5:00001000 r4:e47a2000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84f9a400 r4:82918808 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eaa4b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8510878c r4:85108400 r4:850cb680 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r5:80070013 r4:80239bb0 r4:00000000 r5:84fe978c r4:84fe9400 r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 INFO: task kworker/1:248:4038 blocked for more than 454 seconds. r4:84f9bc00 [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa69e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850daa80 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84f9bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa5b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85108b8c r4:85108800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85108b8c r4:850cb700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84f9bc00 r8:850cb72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850cb700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850cb700 r8:8027f5e8 r7:eaa09e60 r6:8505dd00 r5:84f9bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa69fb0 to 0xeaa69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850da740 INFO: task kworker/1:248:4038 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: d730d000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84f99800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa75e08 r5:00001000 r4:eaa6b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84f99800 r8:850cb7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850daac0 Call trace: dd20: d7895000 edddd000 00000001 80239b98 7fb69000 00000001 r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eaa93000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8510938c r4:850cb800 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: d7895000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:212:4044 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:212 state:D stack:0 pid:4044 tgid:4044 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eaa91d84 r8:00000002 r7:60000113 r6:eaa91d8c r5:85090c00 r4:85090c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85090c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa91e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850eb040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85090c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0cd000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaaa7000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fc9f8c r4:84fc9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fc9f8c r4:8505de00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85090c00 r8:8505de2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8505de00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8505de00 r8:8027f5e8 r7:ea9b9e60 r6:850cb900 r5:85090c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa91fb0 to 0xeaa91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850d2cc0 INFO: task kworker/0:212:4044 is blocked on a mutex likely owned by task kworker/1:172:3871. Workqueue: events bpf_prog_free_deferred dd60: 80230ad4 80239bb0 80070013 ffffffff r4:e883ddc0 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:251:4046 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:251 state:D stack:0 pid:4046 tgid:4046 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eaaa5d84 r8:00000002 r7:60000113 r6:eaaa5d8c r5:85092400 r4:85092400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85092400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaa5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850dab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85092400 r7:00000000 r6:83018200 r5:00001000 r4:7f0cb000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa9b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8510978c r4:85109400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8510978c r4:850cb980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85092400 r8:850cb9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850cb980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850cb980 r8:8027f5e8 r7:eaa09e60 r6:850cba00 r5:85092400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaa5fb0 to 0xeaaa5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850daec0 INFO: task kworker/1:251:4046 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: d7c96000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eabaf000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:82ac11a4 r4:00000000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:8291880c r9:eaa79d84 r8:00000002 r7:60000113 r6:eaa79d8c r5:84f9c800 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:eaab7000 r5:85109b8c r4:85109800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:850eb080 Call trace: dd20: d82be000 edddd000 00000001 80239b98 7fb69000 00000001 r4:e883ddc0 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:252:4051 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:252 state:D stack:0 pid:4051 tgid:4051 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eaab1d84 r8:00000002 r7:60000113 r6:eaab1d8c r5:84f9e000 r4:84f9e000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f9e000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaab1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e9440 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84f9e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaabf000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85109f8c r4:85109c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85109f8c r4:850cbb00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84f9e000 r8:850cbb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850cbb00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850cbb00 r8:8027f5e8 r7:eaa09e60 r6:850f0000 r5:84f9e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaab1fb0 to 0xeaab1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850e9200 INFO: task kworker/1:252:4051 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: d8607000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:253:4054 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:253 state:D stack:0 pid:4054 tgid:4054 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eaacdd84 r8:00000002 r7:60000113 r6:eaacdd8c r5:84f8c800 r4:84f8c800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f8c800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaacde08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e96c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84f8c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0d5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaadb000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8510a78c r4:8510a400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8510a78c r4:850cbb80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84f8c800 r8:850cbbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850cbb80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850cbb80 r8:8027f5e8 r7:eaa09e60 r6:850f0080 r5:84f8c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaacdfb0 to 0xeaacdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850e9240 INFO: task kworker/1:253:4054 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: d8607000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eaba3000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe883dd28 to 0xe883dd70) r4:82ac11a4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847b1800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaede08 r5:00001000 r4:eab03000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8510af8c r4:8510ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8510af8c r4:850cbc00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847b1800 r8:850cbc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850cbc00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850cbc00 r8:8027f5e8 r7:eaacde60 r6:850f0200 r5:847b1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaedfb0 to 0xeaaedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850e9540 INFO: task kworker/1:254:4058 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: d8a26000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaaef000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 r4:00000000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r4:84e5a440 task:kworker/1:256 state:D stack:0 pid:4061 tgid:4061 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eab37000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8510bf8c r4:8510bc00 r10:61c88647 r9:847b3c00 r8:850cbd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:82ac11a4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:257 state:D stack:0 pid:4063 tgid:4063 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eab11d84 r8:00000002 r7:60000013 r6:eab11d8c r5:847b3000 r4:847b3000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847b3000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab11e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e9a80 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847b3000 r7:00000000 r6:83018200 r5:00001000 r4:7f0db000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab13000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8510b38c r4:8510b000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8510b38c r4:850cbd80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847b3000 r8:850cbdac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850cbd80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850cbd80 r8:8027f5e8 r7:eab01e60 r6:850f0380 r5:847b3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab11fb0 to 0xeab11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850e9640 INFO: task kworker/1:257:4063 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: d9417000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eab1f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8510b78c r4:8510b400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8510b78c r4:850cbe00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85090000 r8:850cbe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850cbe00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850cbe00 r8:8027f5e8 r7:eab01e60 r6:850cbe80 r5:85090000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9c5fb0 to 0xea9c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850e9900 INFO: task kworker/1:258:4065 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: d9518000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 Not tainted 6.15.0-syzkaller #0 r4:85093c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab29e08 r5:00001000 r4:eab2b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:850cbf00 9fa0: 00000000 00000000 00000000 00000000 r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:82ac11a4 r4:00000000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:8291880c r9:eab35d84 r8:00000002 r7:60000013 r6:eab35d8c r5:85094800 r4:00000000 r9:83018205 r8:85094800 r7:00000000 r6:83018200 r5:00001000 r4:7f0e3000 r5:00001000 r4:eab43000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8510c38c r4:850fb000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85094800 r8:850fb02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850fb000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850fb000 r8:8027f5e8 r7:eab01e60 r6:850fb080 r5:85094800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab35fb0 to 0xeab35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850e9cc0 INFO: task kworker/1:260:4071 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: d9947000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:261:4072 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:261 state:D stack:0 pid:4072 tgid:4072 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab41e08 r5:00001000 r4:eab4f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85095400 r8:850fb12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:82ac11a4 r4:00000000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab5b000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:82ac11a4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:263:4076 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:263 state:D stack:0 pid:4076 tgid:4076 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eab65d84 r8:00000002 r7:60000013 r6:eab65d8c r5:85096c00 r4:85096c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85096c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab65e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85101600 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85096c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0eb000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab73000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8510d38c r4:8510d000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8510d38c r4:850fb300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85096c00 r8:850fb32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850fb300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850fb300 r8:8027f5e8 r7:eab4de60 r6:850fb380 r5:85096c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab65fb0 to 0xeab65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85101240 INFO: task kworker/1:263:4076 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: d9f15000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:264:4077 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Call trace: [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eab67000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8510cf8c r4:850fb400 Exception stack(0xeab71fb0 to 0xeab71ff8) task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:84fe978c r4:84fe9400 r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 INFO: task kworker/1:265:4080 blocked for more than 454 seconds. r5:85098c00 r4:82918808 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:eab7f000 r5:8510d78c r4:8510d400 r4:850fb500 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85101500 INFO: task kworker/1:265:4080 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: da48a000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:266:4082 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:266 state:D stack:0 pid:4082 tgid:4082 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eab89d84 r8:00000002 r7:60000013 r6:eab89d8c r5:8509a400 r4:8509a400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8509a400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab89e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85101c00 r5:00001000 r4:eab9b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd60: 80230ad4 80239bb0 80070013 ffffffff r4:00000000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 Not tainted 6.15.0-syzkaller #0 r4:85098000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab95e08 r5:00001000 r4:eab8b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8510db8c r4:850fb700 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd20: daa9c000 edddd000 00000001 80239b98 7fb69000 00000001 r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:268:4085 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:268 state:D stack:0 pid:4085 tgid:4085 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eab99d84 r8:00000002 r7:60000113 r6:eab99d8c r5:8509bc00 r4:8509bc00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8509bc00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab99e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85102040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8509bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfab1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8510e78c r4:8510e400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8510e78c r4:850fb800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8509bc00 r8:850fb82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850fb800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850fb800 r8:8027f5e8 r7:eab89e60 r6:850fb880 r5:8509bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab99fb0 to 0xeab99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85101a00 INFO: task kworker/1:268:4085 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: daa9c000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:00000000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 INFO: task kworker/0:216:4088 blocked for more than 454 seconds. r4:847b0000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaac9e08 r5:00001000 r4:ead65000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:847b0000 r8:850f042c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r5:84fe978c r4:84fe9400 r4:8454d880 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:df9dd000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fcab8c r4:850fb900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847b6000 r8:850fb92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850fb900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850fb900 r8:8027f5e8 r7:eab99e60 r6:850f0500 r5:847b6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabadfb0 to 0xeabadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85101d00 INFO: task kworker/1:269:4089 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: db5ee000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:270:4092 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:270 state:D stack:0 pid:4092 tgid:4092 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8291880c r9:ea8cdd84 r8:00000002 r7:60000013 r6:ea8cdd8c r5:847b6c00 r4:847b6c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847b6c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8cde08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ebf40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847b6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa1b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fcaf8c r4:84fcac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fcaf8c r4:850fb980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:850fb980 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd20: db5ee000 edddd000 00000001 80239b98 7fb69000 00000001 r4:00000000 r5:84fe978c r4:84fe9400 r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: r5:847b5400 r4:82918808 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:dfa63000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8510e38c r4:850fba00 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80070013 r4:80239bb0 r4:e883ddc0 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 INFO: task kworker/1:272:4097 blocked for more than 454 seconds. r4:847b4800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8f5e08 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85102340 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847b4800 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb39000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8510eb8c r4:8510e800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8510eb8c r4:850fba80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847b4800 r8:850fbaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850fba80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850fba80 r8:8027f5e8 r7:eab99e60 r6:850f0680 r5:847b4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8f5fb0 to 0xea8f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85102100 INFO: task kworker/1:272:4097 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: db5ee000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:dfba9000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r5:84fe978c r4:84fe9400 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851028c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847a8000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe3d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8510fb8c r4:8510f800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8510fb8c r4:850fbb80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847a8000 r8:850fbbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850fbb80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850fbb80 r8:8027f5e8 r7:ea905e60 r6:850f0780 r5:847a8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea915fb0 to 0xea915ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85102380 INFO: task kworker/1:274:4101 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: dbbb2000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8454d880 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 r5:00001000 r4:dfc09000 r5:8510f38c r4:8510f000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Workqueue: events bpf_prog_free_deferred dd20: dbbb2000 edddd000 00000001 80239b98 7fb69000 00000001 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8454d880 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ea921d84 r8:00000002 r7:60000113 r6:ea921d8c r5:8509e000 r4:8509e000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8509e000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea921e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85102740 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8509e000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe11000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8510f78c r4:8510f400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8510f78c r4:850fbd00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8509e000 r8:850fbd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850fbd00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850fbd00 r8:8027f5e8 r7:ea915e60 r6:850fbd80 r5:8509e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea921fb0 to 0xea921ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851021c0 INFO: task kworker/1:276:4104 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:dfe7d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 dd20: dc5d0000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:278:4109 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:278 state:D stack:0 pid:4109 tgid:4109 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eabc1d84 r8:00000002 r7:60000113 r6:eabc1d8c r5:847aa400 r4:847aa400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847aa400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:e067d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85118b8c r4:850fbe80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847aa400 r8:850fbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850fbe80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850fbe80 r8:8027f5e8 r7:ea965e60 r6:850f0880 r5:847aa400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabc1fb0 to 0xeabc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851027c0 INFO: task kworker/1:278:4109 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: dc5d0000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 r4:82ac11a4 r4:00000000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:279 state:D stack:0 pid:4110 tgid:4110 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecb000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:847ab000 r8:850fbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd20: dc5d0000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:280:4113 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:280 state:D stack:0 pid:4113 tgid:4113 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ea935d84 r8:00000002 r7:60000113 r6:ea935d8c r5:8509ec00 r4:8509ec00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8509ec00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea935e08 r5:00001000 r4:e063f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:850fbf80 r4:85102980 r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r5:84fe978c r4:84fe9400 r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 INFO: task kworker/1:281:4115 blocked for more than 454 seconds. r4:8509c800 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:e072d000 r10:61c88647 r9:8509c800 r8:851bc0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 r4:00000001 Not tainted 6.15.0-syzkaller #0 r4:8509b000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8509b000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8b9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85102f00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8509b000 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06a7000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85118f8c r4:85118c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85118f8c r4:851bc180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8509b000 r8:851bc1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851bc180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851bc180 r8:8027f5e8 r7:eabc9e60 r6:851bc200 r5:8509b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8b9fb0 to 0xea8b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85102c40 INFO: task kworker/1:282:4116 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: dd1fd000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:283:4119 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:283 state:D stack:0 pid:4119 tgid:4119 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eabd5d84 r8:00000002 r7:60000113 r6:eabd5d8c r5:85091800 r4:85091800 [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e06cf000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8511938c r4:85119000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabd5fb0 to 0xeabd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85101540 INFO: task kworker/1:283:4119 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: dd1fd000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:8291880c r9:eabd9d84 r8:00000002 r7:60000113 r6:eabd9d8c r5:850a0000 r4:00000000 r9:83018205 r8:850a0000 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r5:00001000 r4:e06f1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ead59000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:84fcb78c r4:850f0980 Exception stack(0xeabd1fb0 to 0xeabd1ff8) task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80070013 r4:80239bb0 r4:00000000 r5:00001000 r4:e47a2000 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:285 state:D stack:0 pid:4125 tgid:4125 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabe5e08 r5:00001000 r4:e0759000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85119f8c r4:851bc480 r10:61c88647 r9:847ad400 r8:851bc4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851bc480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851bc480 r8:8027f5e8 r7:eabc9e60 r6:850f0a80 r5:847ad400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabe5fb0 to 0xeabe5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851c4240 INFO: task kworker/1:285:4125 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: ddbad000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:286:4126 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ea8e7000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:847aec00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabede08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851c4680 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847aec00 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea8c9000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8511a38c r4:8511a000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8511a38c r4:851bc580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847aec00 r8:851bc5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851bc580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851bc580 r8:8027f5e8 r7:eabe9e60 r6:850f0b80 r5:847aec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabedfb0 to 0xeabedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851c45c0 INFO: task kworker/1:287:4128 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: ddc4e000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:288 state:D stack:0 pid:4131 tgid:4131 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabf5e08 r5:00001000 r4:ea907000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8511ab8c r4:8511a800 r4:851bc600 5fa0: 00000000 00000000 00000000 00000000 Call trace: dd20: ddc4e000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 r4:850a0c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabdde08 r5:00001000 r4:ea94b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8511b38c r4:8511b000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8511b38c r4:851bc680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850a0c00 r8:851bc6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851bc680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851bc680 r8:8027f5e8 r7:eabf5e60 r6:851bc700 r5:850a0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabddfb0 to 0xeabddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851c46c0 INFO: task kworker/1:289:4133 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: ddc4e000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 r5:00001000 r4:e47a2000 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:850a3000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850a3000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabe1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851c4a00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850a3000 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea927000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8511af8c r4:8511ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8511af8c r4:851bc780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850a3000 r8:851bc7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851bc780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851bc780 r8:8027f5e8 r7:eabdde60 r6:851bc800 r5:850a3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabe1fb0 to 0xeabe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred dd20: de596000 edddd000 00000001 80239b98 7fb69000 00000001 r4:00000000 r5:84fe978c r4:84fe9400 r4:8454d880 Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:291:4137 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:291 state:D stack:0 pid:4137 tgid:4137 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eabfdd84 r8:00000002 r7:60000113 r6:eabfdd8c r5:850a3c00 r4:850a3c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850a3c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabfde08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 r5:00001000 r4:eac03000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:850a3c00 r8:851bc8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:82ac11a4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:850a4800 r4:82918808 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eac0f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8511bb8c r4:851bc980 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 dd60: 80230ad4 80239bb0 80070013 ffffffff r4:00000000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:8291880c r9:eac01d84 r8:00000002 r7:60000113 r6:eac01d8c r5:850a5400 r4:00000000 r4:00000000 r5:00001000 r4:eac27000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeac01fb0 to 0xeac01ff8) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851c4d00 INFO: task kworker/1:293:4141 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: de90a000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:294:4143 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:294 state:D stack:0 pid:4143 tgid:4143 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eac19d84 r8:00000002 r7:60000113 r6:eac19d8c r5:850a6000 r4:850a6000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850a6000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac19e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851c4040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850a6000 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac1b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:8511bf8c r4:851bcb80 Exception stack(0xeac19fb0 to 0xeac19ff8) INFO: task kworker/1:294:4143 is blocked on a mutex likely owned by task kworker/1:172:3871. dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 r4:00000000 r5:84fe978c r4:84fe9400 r4:8454d880 Exception stack(0xe883dfb0 to 0xe883dff8) r4:84e5a440 task:kworker/1:295 state:D stack:0 pid:4145 tgid:4145 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac25e08 r9:83018205 r8:850a6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 r5:00001000 r4:eac33000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:851bcc80 r8:8027f5e8 r7:eac01e60 r6:851bcd00 r5:850a6c00 INFO: task kworker/1:295:4145 is blocked on a mutex likely owned by task kworker/1:172:3871. dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:296:4147 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:296 state:D stack:0 pid:4147 tgid:4147 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eac31d84 r8:00000002 r7:60000013 r6:eac31d8c r5:850a2400 r4:850a2400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850a2400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac31e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d1600 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac4b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85120f8c r4:85120c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85120f8c r4:851bcd80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850a2400 r8:851bcdac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851bcd80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851bcd80 r8:8027f5e8 r7:eac25e60 r6:851bce00 r5:850a2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac31fb0 to 0xeac31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851d1100 INFO: task kworker/1:296:4147 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:8454d880 Exception stack(0xe883dfb0 to 0xe883dff8) INFO: task kworker/1:297:4148 blocked for more than 455 seconds. r4:850a1800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac0de08 r5:00001000 r4:eac3f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:82ac11a4 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:298:4151 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:298 state:D stack:0 pid:4151 tgid:4151 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eac3dd84 r8:00000002 r7:60000113 r6:eac3dd8c r5:85099800 r4:85099800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85099800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac3de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d1900 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85099800 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac63000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8512178c r4:85121400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8512178c r4:851bcf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85099800 r8:851bcfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851bcf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851bcf80 r8:8027f5e8 r7:eac31e60 r6:851db000 r5:85099800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac3dfb0 to 0xeac3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851d1380 INFO: task kworker/1:298:4151 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: df8be000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 Exception stack(0xe883dfb0 to 0xe883dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:850a8000 r4:82918808 r4:00000000 r5:00001000 r4:eac57000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8512138c r4:85121000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8512138c r4:851db080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850a8000 r8:851db0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851db080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851db080 r8:8027f5e8 r7:eac3de60 r6:851db100 r5:850a8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac55fb0 to 0xeac55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851d1380 INFO: task kworker/1:299:4153 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:8291880c r9:eac61d84 r8:00000002 r7:60000013 r6:eac61d8c r5:850a8c00 r4:850a8c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850a8c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac61e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d1a40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850a8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac6f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85121b8c r4:85121800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:851db180 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:82ac11a4 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:301:4158 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:301 state:D stack:0 pid:4158 tgid:4158 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eac83000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:851db280 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe883dd28 to 0xe883dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe883dfb0 to 0xe883dff8) Not tainted 6.15.0-syzkaller #0 r4:850abc00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac79e08 r5:00001000 r4:eac7b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:303:4161 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:303 state:D stack:0 pid:4161 tgid:4161 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eac99d84 r8:00000002 r7:60000113 r6:eac99d8c r5:850a9800 r4:850a9800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850a9800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac99e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e1280 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850a9800 r7:00000000 r6:83018200 r5:00001000 r4:7f0fb000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacab000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85122f8c r4:85122c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85122f8c r4:851db500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850a9800 r8:851db52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851db500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851db500 r8:8027f5e8 r7:eac49e60 r6:851db580 r5:850a9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac99fb0 to 0xeac99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851d1c40 INFO: task kworker/1:303:4161 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: e040e000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 r4:8454d880 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaca5e08 r5:00001000 r4:eac8b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeaca5fb0 to 0xeaca5ff8) task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11a4 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:850ac800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850ac800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaca9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85101c80 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850ac800 r7:00000000 r6:83018200 r5:00001000 r4:7f0f9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac9b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85122b8c r4:85122800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85122b8c r4:851db680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850ac800 r8:851db6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851db680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851db680 r8:8027f5e8 r7:eac99e60 r6:851db700 r5:850ac800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaca9fb0 to 0xeaca9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851d1ac0 INFO: task kworker/1:305:4165 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: e040e000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 r4:e883ddc0 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84e5a440 r4:850aec00 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eacb7000 r7:ddde2d80 r6:83018200 r5:8512338c r4:851db780 r4:851e1100 r4:00000000 r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:307:4169 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:307 state:D stack:0 pid:4169 tgid:4169 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eacc1d84 r8:00000002 r7:60000113 r6:eacc1d8c r5:850ad400 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eacdb000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:851db880 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe883dd28 to 0xe883dd70) r4:00000000 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Not tainted 6.15.0-syzkaller #0 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac6de08 r5:00001000 r4:eacc3000 r5:8512378c r4:85123400 r10:00000000 r9:851db980 r8:8027f5e8 r7:eacc1e60 r6:851dba00 r5:850b0000 r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:e883ddc0 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:309:4173 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:309 state:D stack:0 pid:4173 tgid:4173 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eaccdd84 r8:00000002 r7:60000013 r6:eaccdd8c r5:850b0c00 r4:850b0c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850b0c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaccde08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e1800 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850b0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f101000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaccf000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85123b8c r4:85123800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85123b8c r4:851dba80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850b0c00 r8:851dbaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851dba80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851dba80 r8:8027f5e8 r7:eacc1e60 r6:851dbb00 r5:850b0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaccdfb0 to 0xeaccdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851e1500 INFO: task kworker/1:309:4173 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: e0e42000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 r4:82ac11a4 r5:00001000 r4:e47a2000 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Not tainted 6.15.0-syzkaller #0 r5:8519a400 r4:82918808 r9:83018205 r8:8519a400 r7:00000000 r6:83018200 r5:00001000 r4:7f105000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:82ac11a4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:8519bc00 r4:00000000 r5:00001000 r4:eacf7000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) INFO: task kworker/1:311:4177 is blocked on a mutex likely owned by task kworker/1:172:3871. r4:00000000 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Not tainted 6.15.0-syzkaller #0 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:ead13000 r4:851dbc80 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:82ac11a4 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84e5a440 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eace5d84 r8:00000002 r7:60000113 r6:eace5d8c r5:850b2400 r4:850b2400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850b2400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eace5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e1d00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850b2400 r7:00000000 r6:83018200 r5:00001000 r4:7f109000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead07000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8512cb8c r4:8512c800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8512cb8c r4:851dbd80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850b2400 r8:851dbdac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851dbd80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851dbd80 r8:8027f5e8 r7:eacd9e60 r6:851dbe00 r5:850b2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeace5fb0 to 0xeace5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851e1a00 INFO: task kworker/1:313:4180 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82ac11a4 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:314:4183 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:314 state:D stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ead05d84 r8:00000002 r7:60000113 r6:ead05d8c r5:850b3000 r4:850b3000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850b3000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:ead1b000 r10:61c88647 r9:850b3000 r8:851dbeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r5:00001000 r4:e47a2000 r4:00000001 task:kworker/1:315 state:D stack:0 pid:4185 tgid:4185 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:ead2d000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred r4:82ac11a4 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8291880c r9:ead39d84 r8:00000002 r7:60000113 r6:ead39d8c r5:850b6000 r4:850b6000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850b6000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead39e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f0440 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850b6000 r7:00000000 r6:83018200 r5:00001000 r4:7f111000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead35000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8512db8c r4:8512d800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8512db8c r4:851f2080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850b6000 r8:851f20ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851f2080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f2080 r8:8027f5e8 r7:ead11e60 r6:851f2100 r5:850b6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead39fb0 to 0xead39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851f0100 INFO: task kworker/1:316:4187 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: e21e7000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r4:00000000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe883dfb0 to 0xe883dff8) Not tainted 6.15.0-syzkaller #0 r4:850b6c00 [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ead41000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:82ac11a4 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:318:4191 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:318 state:D stack:0 pid:4191 tgid:4191 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ead51d84 r8:00000002 r7:60000013 r6:ead51d8c r5:8519b000 r4:8519b000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8519b000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead51e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f0740 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8519b000 r7:00000000 r6:83018200 r5:00001000 r4:7f115000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead4d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8512e38c r4:8512e000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8512e38c r4:851f2280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8519b000 r8:851f22ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851f2280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f2280 r8:8027f5e8 r7:ead45e60 r6:850f0d80 r5:8519b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead51fb0 to 0xead51ff8) Workqueue: events bpf_prog_free_deferred r4:82ac11a4 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 r5:00001000 r4:dfa03000 r5:8512ef8c r4:8512ec00 Exception stack(0xead5dfb0 to 0xead5dff8) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) Exception stack(0xe883dfb0 to 0xe883dff8) Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ead69d84 r8:00000002 r7:60000113 r6:ead69d8c r5:850b5400 r4:850b5400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850b5400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead69e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f0e00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df957000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851f0100 INFO: task kworker/1:320:4194 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: e29f4000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:e883ddc0 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead85e08 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead75000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xead85fb0 to 0xead85ff8) INFO: task kworker/0:218:4197 is blocked on a mutex likely owned by task kworker/1:172:3871. dd60: 80230ad4 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:dfa99000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8454a78c r4:8454a400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8454a78c r4:850f0f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850ba400 r8:850f0f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850f0f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f0f00 r8:8027f5e8 r7:ead85e60 r6:851f2500 r5:850ba400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead95fb0 to 0xead95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851dde80 INFO: task kworker/0:219:4198 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: e2dc8000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:82ac11a4 r5:00001000 r4:e47a2000 r4:00000001 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ea981d84 r8:00000002 r7:60000113 r6:ea981d8c r5:850bbc00 r4:850bbc00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850bbc00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea981e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f0f00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850bbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9e3000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8512eb8c r4:8512e800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8512eb8c r4:851f2600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850bbc00 r8:851f262c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851f2600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f2600 r8:8027f5e8 r7:ead5de60 r6:851f2680 r5:850bbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea981fb0 to 0xea981ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:851f0d80 Exception stack(0xe883dd28 to 0xe883dd70) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:850bb000 r4:82918808 r9:83018205 r8:850bb000 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 r7:ddde2d80 r6:83018200 r5:8512f38c r4:851f2700 INFO: task kworker/1:322:4204 is blocked on a mutex likely owned by task kworker/1:172:3871. r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r10:8291880c r9:ead89d84 r8:00000002 r7:60000113 r6:ead89d8c r5:850bc800 r4:850bc800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850bc800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead89e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ed3c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850bc800 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcb7000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8512f78c r4:8512f400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8512f78c r4:851f2800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850bc800 r8:851f282c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851f2800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f2800 r8:8027f5e8 r7:ea9d1e60 r6:851f2880 r5:850bc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead89fb0 to 0xead89ff8) task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84fe978c r4:84fe9400 Exception stack(0xe883dfb0 to 0xe883dff8) Workqueue: events bpf_prog_free_deferred r4:00000000 r5:00001000 r4:dfd07000 r10:61c88647 r9:850bd400 r8:851f292c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r4:00000001 Not tainted 6.15.0-syzkaller #0 r4:00000000 r5:00001000 r4:dfd51000 r5:8512ff8c r4:8512fc00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8512ff8c r4:851f2a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850be000 r8:851f2a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851f2a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f2a00 r8:8027f5e8 r7:eaa1de60 r6:851f2a80 r5:850be000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead25fb0 to 0xead25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851ed240 INFO: task kworker/1:325:4211 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: e395e000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8291880c r9:eaa21d84 r8:00000002 r7:60000013 r6:eaa21d8c r5:850bec00 r5:00001000 r4:dfda3000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:851f2b00 r4:851ed5c0 Exception stack(0xe883dd28 to 0xe883dd70) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 r4:00000001 task:kworker/1:327 state:D stack:0 pid:4215 tgid:4215 ppid:2 task_flags:0x4208060 flags:0x00000000 r9:83018205 r8:850b9800 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 r7:ddde2d80 r6:83018200 r5:85138b8c r4:851f2c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850b9800 r8:851f2c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851f2c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f2c00 r8:8027f5e8 r7:eaa21e60 r6:851f2c80 r5:850b9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa41fb0 to 0xeaa41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851ed640 INFO: task kworker/1:327:4215 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: e41ff000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 INFO: task kworker/1:328:4217 blocked for more than 455 seconds. [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:dfdf1000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:329:4219 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa51e08 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff8d000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:851f2e00 r8:8027f5e8 r7:eaa41e60 r6:851f2e80 r5:850c0000 Workqueue: events bpf_prog_free_deferred dd60: 80230ad4 80239bb0 80070013 ffffffff [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:850c0c00 r4:82918808 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa61e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ede40 r5:00001000 r4:dffd5000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:850c0c00 r8:851f2f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa61fb0 to 0xeaa61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851edb80 INFO: task kworker/1:330:4222 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: e4617000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:e007b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85139b8c r4:851fd000 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851edcc0 INFO: task kworker/1:331:4224 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: e4c6f000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:332:4226 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:332 state:D stack:0 pid:4226 tgid:4226 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:850c2400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaa1e08 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e005b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8513978c r4:851fd100 r10:00000000 r9:851fd100 r8:8027f5e8 r7:eaa89e60 r6:851fd180 r5:850c2400 Workqueue: events bpf_prog_free_deferred r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:333:4228 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:333 state:D stack:0 pid:4228 tgid:4228 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eaac5d84 r8:00000002 r7:60000013 r6:eaac5d8c r5:850c3000 r4:850c3000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850c3000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaac5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85204040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850c3000 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03d1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8513a38c r4:8513a000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8513a38c r4:851fd200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850c3000 r8:851fd22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851fd200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fd200 r8:8027f5e8 r7:eaa89e60 r6:851fd280 r5:850c3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaac5fb0 to 0xeaac5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85204080 INFO: task kworker/1:333:4228 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: e4f6e000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 r4:82ac11a4 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:334 state:D stack:0 pid:4229 tgid:4229 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:e03b1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeaa71fb0 to 0xeaa71ff8) r4:85204080 r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:82ac11a4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:335:4231 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:335 state:D stack:0 pid:4231 tgid:4231 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eaaadd84 r8:00000002 r7:60000013 r6:eaaadd8c r5:850c4800 r4:850c4800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850c4800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaade08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85204400 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850c4800 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e048b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8513a78c r4:8513a400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8513a78c r4:851fd400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850c4800 r8:851fd42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851fd400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fd400 r8:8027f5e8 r7:eaac5e60 r6:851fd480 r5:850c4800 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:84fe978c r4:84fe9400 r4:8454d880 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e055f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8513ab8c r4:851fd500 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:82ac11a4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:337:4235 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:337 state:D stack:0 pid:4235 tgid:4235 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eaae1d84 r8:00000002 r7:60000113 r6:eaae1d8c r5:85238000 r4:85238000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85238000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaae1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85204880 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85238000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0583000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8513af8c r4:8513ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8513af8c r4:851fd600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85238000 r8:851fd62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851fd600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fd600 r8:8027f5e8 r7:eaad9e60 r6:851fd680 r5:85238000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaae1fb0 to 0xeaae1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85204440 INFO: task kworker/1:337:4235 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: e5318000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:338:4237 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e061d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:851fd700 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r5:84fe978c r4:84fe9400 r4:8454d880 r4:00000001 r4:84e5a440 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:8519e000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab09e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85204980 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8519e000 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e059b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8513b38c r4:8513b000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8513b38c r4:851fd780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8519e000 r8:851fd7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851fd780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fd780 r8:8027f5e8 r7:eaaf5e60 r6:8520e080 r5:8519e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab09fb0 to 0xeab09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85204300 INFO: task kworker/1:339:4238 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: e55b4000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:e883ddc0 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8454d880 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85198000 r4:82918808 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018205 r8:85198000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05f7000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8513b78c r4:8513b400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8513b78c r4:851fd800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85198000 r8:851fd82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851fd800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fd800 r8:8027f5e8 r7:eaaf5e60 r6:8520e100 r5:85198000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaad5fb0 to 0xeaad5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85204900 INFO: task kworker/1:340:4242 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: e5a51000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:341:4243 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:341 state:D stack:0 pid:4243 tgid:4243 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eab19d84 r8:00000002 r7:60000013 r6:eab19d8c r5:85199800 r4:85199800 r5:85199800 r4:82918808 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:e47e7000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85270b8c r4:851fd880 Exception stack(0xeab19fb0 to 0xeab19ff8) r4:85204b00 Call trace: dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0773000 r5:8513bf8c r4:8513bc00 r4:851fd900 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:343:4248 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:343 state:D stack:0 pid:4248 tgid:4248 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eab3dd84 r8:00000002 r7:60000113 r6:eab3dd8c r5:850ae000 r4:850ae000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850ae000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab3de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85204300 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850ae000 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47b1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527038c r4:85270000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:850ae000 r8:851fd9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd20: e629e000 edddd000 00000001 80239b98 7fb69000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e47cf000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8527078c r4:851fda00 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8520c080 INFO: task kworker/1:344:4251 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: e629e000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:345:4252 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:345 state:D stack:0 pid:4252 tgid:4252 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eab6dd84 r8:00000002 r7:60000013 r6:eab6dd8c r5:84c80000 r4:84c80000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c80000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab6de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520c340 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84c80000 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47f9000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85270f8c r4:85270c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85270f8c r4:851fda80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c80000 r8:851fdaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851fda80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fda80 r8:8027f5e8 r7:eab19e60 r6:8520e380 r5:84c80000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab6dfb0 to 0xeab6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8520c080 INFO: task kworker/1:345:4252 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 r5:80070013 r4:80239bb0 r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:346:4254 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:346 state:D stack:0 pid:4254 tgid:4254 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eab85d84 r8:00000002 r7:60000013 r6:eab85d8c r5:84c81800 r4:84c81800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c81800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ea977000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85271b8c r4:85271800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85271b8c r4:851fdb00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c81800 r8:851fdb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851fdb00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fdb00 r8:8027f5e8 r7:eab6de60 r6:8520e400 r5:84c81800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab85fb0 to 0xeab85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8520c1c0 INFO: task kworker/1:346:4254 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: e6885000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e8819000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527138c r4:85271000 r7:ddde2d80 r6:83018200 r5:8527138c r4:851fdb80 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r5:84fe978c r4:84fe9400 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:348:4257 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:348 state:D stack:0 pid:4257 tgid:4257 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eab91d84 r8:00000002 r7:60000113 r6:eab91d8c r5:8523a400 r4:8523a400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8523a400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab91e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520c600 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8523a400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e887b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527178c r4:85271400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8527178c r4:851fdc80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8523a400 r8:851fdcac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851fdc80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fdc80 r8:8027f5e8 r7:eab85e60 r6:851fdd00 r5:8523a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab91fb0 to 0xeab91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8520c240 INFO: task kworker/1:348:4257 is blocked on a mutex likely owned by task kworker/1:172:3871. Exception stack(0xe883dd28 to 0xe883dd70) dd20: e6d56000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:349:4260 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:349 state:D stack:0 pid:4260 tgid:4260 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520c780 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8523b000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9ef000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527238c r4:85272000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8527238c r4:851fdd80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8523b000 r8:851fddac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851fdd80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fdd80 r8:8027f5e8 r7:eab85e60 r6:851fde00 r5:8523b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaba9fb0 to 0xeaba9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8520c5c0 INFO: task kworker/1:349:4260 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) dd20: e7207000 edddd000 00000001 80239b98 7fb69000 00000001 r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9db000 r5:85271f8c r4:85271c00 r10:61c88647 r9:8523bc00 r8:851fdeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8520c840 r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:82ac11a4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:351:4264 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:351 state:D stack:0 pid:4264 tgid:4264 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eada1d84 r8:00000002 r7:60000113 r6:eada1d8c r5:8523c800 r4:8523c800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8523c800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eada1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520cbc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8523c800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa03000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r4:82ac11a4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e5a440 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eaa2d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85272f8c r4:85272c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85272f8c r4:8521a080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8523d400 r8:8521a0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8521a080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8521a080 r8:8027f5e8 r7:eada1e60 r6:8521a100 r5:8523d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeada5fb0 to 0xeada5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8520ccc0 INFO: task kworker/1:352:4266 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: e76ef000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:353:4268 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:353 state:D stack:0 pid:4268 tgid:4268 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eada9d84 r8:00000002 r7:60000013 r6:eada9d8c r5:8523e000 r4:8523e000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8523e000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eada9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520ccc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8523e000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa13000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85272b8c r4:8521a180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8523e000 r8:8521a1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8521a180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8521a180 r8:8027f5e8 r7:eada5e60 r6:8521a200 r5:8523e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeada9fb0 to 0xeada9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8520ca40 INFO: task kworker/1:353:4268 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: e7823000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:00001000 r4:e47a2000 r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 Exception stack(0xe883dfb0 to 0xe883dff8) Not tainted 6.15.0-syzkaller #0 r10:8291880c r9:eadadd84 r8:00000002 r7:60000113 r6:eadadd8c r5:8523ec00 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520cfc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8523ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa47000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527338c r4:85273000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8527338c r4:8521a280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8523ec00 r8:8521a2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8521a280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8521a280 r8:8027f5e8 r7:eada5e60 r6:8521a300 r5:8523ec00 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:80070013 r4:80239bb0 r5:00001000 r4:e47a2000 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:355:4272 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:355 state:D stack:0 pid:4272 tgid:4272 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eadb1d84 r8:00000002 r7:60000013 r6:eadb1d8c r5:85239800 r4:85239800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85239800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadb1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85222440 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85239800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa85000 r7:ddde2d80 r6:83018200 r5:85273f8c r4:8521a380 r4:8520ce00 dd20: e7f7a000 edddd000 00000001 80239b98 7fb69000 00000001 r5:84fe978c r4:84fe9400 dfa0: 00000000 00000000 00000000 00000000 r4:850c6c00 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85222040 r9:83018205 r8:850c6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa59000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527378c r4:85273400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8527378c r4:8521a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850c6c00 r8:8521a4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8521a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8521a480 r8:8027f5e8 r7:eadb1e60 r6:8521a500 r5:850c6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab25fb0 to 0xeab25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85222080 INFO: task kworker/1:356:4273 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 Exception stack(0xe883dd28 to 0xe883dd70) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) dfa0: 00000000 00000000 00000000 00000000 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadb5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85222300 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850c5400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa6d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85273b8c r4:85273800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85273b8c r4:8521a580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850c5400 r8:8521a5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8521a580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8521a580 r8:8027f5e8 r7:eadb1e60 r6:8521a600 r5:850c5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadb5fb0 to 0xeadb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Call trace: [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018205 r8:85240000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000000 r4:e883ddc0 r5:84fe978c r4:84fe9400 dfa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:359 state:D stack:0 pid:4280 tgid:4280 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eadc1d84 r8:00000002 r7:60000013 r6:eadc1d8c r5:85240c00 r4:85240c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85240c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadc1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852225c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85240c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa97000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527838c r4:85278000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8527838c r4:8521a780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85240c00 r8:8521a7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8521a780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:82ac11a4 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eadc5d84 r8:00000002 r7:60000013 r6:eadc5d8c r5:85241800 r4:85241800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85241800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadc5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85222640 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85241800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaab9000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 5fa0: 00000000 00000000 00000000 00000000 r4:82ac11a4 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84e5a440 r4:85242400 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85222a80 r5:00001000 r4:eaaf1000 r4:00000001 task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:362:4286 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:362 state:D stack:0 pid:4286 tgid:4286 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eadd5d84 r8:00000002 r7:60000113 r6:eadd5d8c r5:85243000 r4:85243000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r4:00000000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) INFO: task kworker/1:362:4286 is blocked on a mutex likely owned by task kworker/1:172:3871. r4:00000000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Not tainted 6.15.0-syzkaller #0 r4:00000000 r4:00000000 r5:00001000 r4:eab45000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xeadd9fb0 to 0xeadd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85222c40 INFO: task kworker/1:363:4288 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: e916f000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:85279b8c r4:85279800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadddfb0 to 0xeadddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85222b80 INFO: task kworker/1:364:4291 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 dd20: e94c2000 edddd000 00000001 80239b98 7fb69000 00000001 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:85245400 r4:82918808 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:ddde2d80 r6:83018200 r5:85279f8c r4:8521ad80 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 r5:84fe978c r4:84fe9400 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:366 state:D stack:0 pid:4294 tgid:4294 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eade5d84 r8:00000002 r7:60000113 r6:eade5d8c r5:85246000 r4:85246000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85246000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eade5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ae0c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85246000 r7:00000000 r6:83018200 r5:00001000 r4:7f0cd000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaba5000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527a38c r4:8527a000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8527a38c r4:8521ae80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85246000 r8:8521aeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8521ae80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8521ae80 r8:8027f5e8 r7:eade1e60 r6:8521af00 r5:85246000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeade5fb0 to 0xeade5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85222fc0 INFO: task kworker/1:366:4294 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: e98a7000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/1:367 state:D stack:0 pid:4296 tgid:4296 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85248000 r4:82918808 [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85201740 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85248000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 r5:8527a78c r4:8527a400 r7:ddde2d80 r6:83018200 r5:8527a78c r4:8521af80 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:852ae100 INFO: task kworker/1:367:4296 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: e98a7000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Not tainted 6.15.0-syzkaller #0 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:00001000 r4:ea957000 Exception stack(0xeadedfb0 to 0xeadedff8) r4:00000000 r4:82ac11a4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:221:4301 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:221 state:D stack:0 pid:4301 tgid:4301 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eac09d84 r8:00000002 r7:60000113 r6:eac09d8c r5:8524b000 r4:8524b000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8522e800 r4:00000000 r4:82ac11a4 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:222:4302 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:222 state:D stack:0 pid:4302 tgid:4302 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eac15d84 r8:00000002 r7:60000013 r6:eac15d8c r5:8524a400 r4:8524a400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8524a400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac15e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522eb00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8524a400 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb2d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8515038c r4:85150000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8515038c r4:8520e500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8524a400 r8:8520e52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8520e500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:222:4302 is blocked on a mutex likely owned by task kworker/1:172:3871. r4:e883ddc0 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 r4:00000000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:8515078c r4:8520e580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85249800 r8:8520e5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8520e580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8520e580 r8:8027f5e8 r7:eac09e60 r6:852b0280 r5:85249800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac2dfb0 to 0xeac2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8522e880 INFO: task kworker/0:223:4304 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred dd20: ea507000 edddd000 00000001 80239b98 7fb69000 00000001 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Call trace: [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 1fa0: 00000000 00000000 00000000 00000000 r4:00000000 r4:e883ddc0 r5:84fe978c r4:84fe9400 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac5de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522ef00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8524e000 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe39000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85150f8c r4:85150c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85150f8c r4:8520e680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8524e000 r8:8520e6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8520e680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:225:4308 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd60: 80230ad4 80239bb0 80070013 ffffffff r5:84fe978c r4:84fe9400 Exception stack(0xe883dfb0 to 0xe883dff8) Not tainted 6.15.0-syzkaller #0 [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:dfe9f000 r7:dddced80 r6:83018000 r5:8515138c r4:8520e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8524ec00 r8:8520e72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8520e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8520e700 r8:8027f5e8 r7:eac09e60 r6:852b0400 r5:8524ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac75fb0 to 0xeac75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8522ec40 INFO: task kworker/0:226:4310 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eade9e08 r4:00000000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xeade9fb0 to 0xeade9ff8) [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 Exception stack(0xe883dfb0 to 0xe883dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:228:4315 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:228 state:D stack:0 pid:4315 tgid:4315 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eac91d84 r8:00000002 r7:60000013 r6:eac91d8c r5:84c82400 r4:84c82400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c82400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac91e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d99e00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84c82400 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e067b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85151b8c r4:85151800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85151b8c r4:8520e880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c82400 r8:8520e8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8520e880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8520e880 r8:8027f5e8 r7:eac09e60 r6:8520e900 r5:84c82400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac91fb0 to 0xeac91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8522a080 INFO: task kworker/0:228:4315 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: eaeaa000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 r5:84fe978c r4:84fe9400 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:229:4316 blocked for more than 456 seconds. r4:84c83c00 [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84c83c00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 r5:85151f8c r4:85151c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8522a080 Call trace: dd20: eaeaa000 edddd000 00000001 80239b98 7fb69000 00000001 r4:00000000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:230:4319 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:230 state:D stack:0 pid:4319 tgid:4319 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eacbdd84 r8:00000002 r7:60000113 r6:eacbdd8c r5:84c84800 r4:84c84800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c84800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacbde08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522a4c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84c84800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 r5:00001000 r4:e0707000 r4:00000001 Call trace: r4:82ac11a4 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) INFO: task kworker/0:231:4320 blocked for more than 456 seconds. r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522a6c0 r5:85152b8c r4:85152800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacb1fb0 to 0xeacb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8522a200 INFO: task kworker/0:231:4320 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: eb35b000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:232:4324 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:232 state:D stack:0 pid:4324 tgid:4324 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8291880c r9:eacc9d84 r8:00000002 r7:60000013 r6:eacc9d8c r5:84c86000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacc9e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522a7c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84c86000 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 r5:00001000 r4:ea8bf000 r5:85152f8c r4:85152c00 r10:61c88647 r9:84c86000 r8:8520ecac r7:82804d40 r6:dddced80 r5:dddceda0 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 dd20: eb66a000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:233:4325 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:233 state:D stack:0 pid:4325 tgid:4325 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eace1d84 r8:00000002 r7:60000013 r6:eace1d8c r5:84c86c00 r4:84c86c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c86c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eace1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522a940 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84c86c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea8d9000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8515338c r4:85153000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8515338c r4:8520ed80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c86c00 r8:8520edac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8520ed80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8520ed80 r8:8027f5e8 r7:eacc9e60 r6:8520ee00 r5:84c86c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeace1fb0 to 0xeace1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8522a5c0 INFO: task kworker/0:233:4325 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: eb66a000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:234:4327 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:234 state:D stack:0 pid:4327 tgid:4327 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eacedd84 r8:00000002 r7:60000013 r6:eacedd8c r5:84c83000 r4:84c83000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c83000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacede08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522ac40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84c83000 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea931000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85153b8c r4:85153800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85153b8c r4:8520ee80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c83000 r8:8520eeac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8520ee80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8520ee80 r8:8027f5e8 r7:eace1e60 r6:8520ef00 r5:84c83000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacedfb0 to 0xeacedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8522aa00 INFO: task kworker/0:234:4327 is blocked on a mutex likely owned by task kworker/1:172:3871. r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:235:4329 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:235 state:D stack:0 pid:4329 tgid:4329 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eacfdd84 r8:00000002 r7:60000013 r6:eacfdd8c r5:847a8c00 r4:847a8c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847a8c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacfde08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522aac0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:847a8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea909000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8515378c r4:85153400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8515378c r4:8520ef80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847a8c00 r8:8520efac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8520ef80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8520ef80 r8:8027f5e8 r7:eacede60 r6:85213000 r5:847a8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacfdfb0 to 0xeacfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8522a8c0 INFO: task kworker/0:235:4329 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 Exception stack(0xe883dd28 to 0xe883dd70) dd60: 80230ad4 80239bb0 80070013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe883dfb0 to 0xe883dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Not tainted 6.15.0-syzkaller #0 Call trace: r4:84f9d400 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852070c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f9d400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac41000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85158b8c r4:85158800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85158b8c r4:85213080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84f9d400 r8:852130ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85213080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85213080 r8:8027f5e8 r7:eacede60 r6:85213100 r5:84f9d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead0dfb0 to 0xead0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8522aa40 INFO: task kworker/0:236:4331 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: ebefa000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:237:4333 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:237 state:D stack:0 pid:4333 tgid:4333 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eacd5d84 r8:00000002 r7:60000113 r6:eacd5d8c r5:84e90000 r4:84e90000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e90000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacd5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522af00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84e90000 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabbd000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8515838c r4:85158000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8515838c r4:85213200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e90000 r8:8521322c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85213200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85213200 r8:8027f5e8 r7:ead0de60 r6:85213180 r5:84e90000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacd5fb0 to 0xeacd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8522af80 INFO: task kworker/0:237:4333 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: ec0ea000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 r4:82ac11a4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r5:00001000 r4:e47a2000 r5:84fe978c r4:84fe9400 r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:369:4335 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:369 state:D stack:0 pid:4335 tgid:4335 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ead79d84 r8:00000002 r7:60000113 r6:ead79d8c r5:84e90c00 r4:84e90c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e90c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead79e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d88c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84e90c00 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd15000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527b78c r4:8527b400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8527b78c r4:852b0480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e90c00 r8:852b04ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852b0480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b0480 r8:8027f5e8 r7:eadb9e60 r6:85213280 r5:84e90c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead79fb0 to 0xead79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852ae400 INFO: task kworker/1:369:4335 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: ec598000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:238:4336 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:238 state:D stack:0 pid:4336 tgid:4336 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ead7dd84 r8:00000002 r7:60000013 r6:ead7dd8c r5:84e91800 r4:84e91800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e91800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead7de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522e580 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84e91800 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac11000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8515878c r4:85158400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8515878c r4:85213300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e91800 r8:8521332c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85213300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85213300 r8:8027f5e8 r7:ead0de60 r6:85213380 r5:84e91800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead7dfb0 to 0xead7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8522e100 INFO: task kworker/0:238:4336 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: ec598000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:239:4339 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:239 state:D stack:0 pid:4339 tgid:4339 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eae05d84 r8:00000002 r7:60000013 r6:eae05d8c r5:84e92400 r4:84e92400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e92400 r4:82918808 [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85207000 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85158f8c r4:85158c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85158f8c r4:85213400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e92400 r8:8521342c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85213400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85213400 r8:8027f5e8 r7:ead0de60 r6:85213480 r5:84e92400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae05fb0 to 0xeae05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85207000 INFO: task kworker/0:239:4339 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: ec9ca000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:240:4341 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:240 state:D stack:0 pid:4341 tgid:4341 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eae1dd84 r8:00000002 r7:60000013 r6:eae1dd8c r5:8524d400 r4:8524d400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8524d400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae1de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85207440 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8524d400 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac85000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8515938c r4:85159000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8515938c r4:85213500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8524d400 r8:8521352c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85213500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85213500 r8:8027f5e8 r7:eae05e60 r6:852b0500 r5:8524d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae1dfb0 to 0xeae1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852071c0 INFO: task kworker/0:240:4341 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: ec9ca000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:241:4343 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:241 state:D stack:0 pid:4343 tgid:4343 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eae29d84 r8:00000002 r7:60000013 r6:eae29d8c r5:85250000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae29e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85207580 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8515978c r4:85159400 r7:dddced80 r6:83018000 r5:8515978c r4:85213580 r10:00000000 r9:85213580 r8:8027f5e8 r7:eae1de60 r6:852b0580 r5:85250000 task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:8291880c r9:eae3dd84 r8:00000002 r7:60000113 r6:eae3dd8c r5:85251800 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85207840 r5:85159f8c r4:85159c00 r10:61c88647 r9:85251800 r8:8521362c r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: ed046000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:243:4346 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:243 state:D stack:0 pid:4346 tgid:4346 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eae11d84 r8:00000002 r7:60000113 r6:eae11d8c r5:84e93000 r4:84e93000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e93000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae11e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852076c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84e93000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacd1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85159b8c r4:85159800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85159b8c r4:85213680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e93000 r8:852136ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85213680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85213680 r8:8027f5e8 r7:eae3de60 r6:85213700 r5:84e93000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae11fb0 to 0xeae11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85207400 INFO: task kworker/0:243:4346 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:244:4349 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:244 state:D stack:0 pid:4349 tgid:4349 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eae2dd84 r8:00000002 r7:60000113 r6:eae2dd8c r5:84e93c00 r4:84e93c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e93c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae2de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85207e80 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84e93c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead49000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8515af8c r4:8515ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8515af8c r4:85213780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e93c00 r8:852137ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85213780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85213780 r8:8027f5e8 r7:eae3de60 r6:85213800 r5:84e93c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae2dfb0 to 0xeae2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85207640 task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad4 80239bb0 80070013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:00000000 r5:00001000 r4:e47a2000 r5:84fe978c r4:84fe9400 r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 Exception stack(0xe883dfb0 to 0xe883dff8) INFO: task kworker/0:245:4350 blocked for more than 456 seconds. r4:84e94800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae15e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85207a80 r5:00001000 r4:ead17000 r5:8515a38c r4:8515a000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: ed747000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:246:4353 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:246 state:D stack:0 pid:4353 tgid:4353 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eae4dd84 r8:00000002 r7:60000013 r6:eae4dd8c r5:84e96000 r4:84e96000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e96000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae4de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85207b80 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84e96000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead2b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8515a78c r4:8515a400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8515a78c r4:85213980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:85213980 r10:00000000 r9:85213980 r8:8027f5e8 r7:eae2de60 r6:85213a00 r5:84e96000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85207980 Workqueue: events bpf_prog_free_deferred r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:247:4355 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:247 state:D stack:0 pid:4355 tgid:4355 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eae51d84 r8:00000002 r7:60000113 r6:eae51d8c r5:84e96c00 r4:84e96c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e96c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae51e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85207c80 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84e96c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead3b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8515ab8c r4:8515a800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8515ab8c r4:85213a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e96c00 r8:85213aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85213a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85213a80 r8:8027f5e8 r7:eae2de60 r6:85213b00 r5:84e96c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae51fb0 to 0xeae51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85207a00 INFO: task kworker/0:247:4355 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85020000 r8:80200be4 r7:e883dd5c r6:ffffffff r5:85020000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe883dd28 to 0xe883dd70) dd20: edc6d000 edddd000 00000001 80239b98 7fb69000 00000001 dd40: 82ac0560 7fb69000 edddd000 8280c930 82ac1184 e883dda4 e883dda8 e883dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:e47a2000 r5:84fe978c r4:84fe9400 r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 r4:8454d880 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:851a8c00 r5:851a8c00 r4:82918808 [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fa040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851a8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000 r5:8515b38c r4:8515b000 r4:85213b80 9fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85207d00 INFO: task kworker/0:248:4357 is blocked on a mutex likely owned by task kworker/1:172:3871. task:kworker/1:172 state:R running task stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a562e4>] (preempt_schedule_common kernel/sched/core.c:6961 [inline]) [<81a551c4>] (__schedule) from [<81a562e4>] (preempt_schedule+0x4c/0xb4 kernel/sched/core.c:6985) r10:00000000 r9:20070013 r8:8291880c r7:81a57ac0 r6:00000001 r5:85020000 r4:81a57ac0 [<81a56298>] (preempt_schedule) from [<81a57ac0>] (class_preempt_destructor include/linux/preempt.h:481 [inline]) [<81a56298>] (preempt_schedule) from [<81a57ac0>] (raw_spin_unlock_irqrestore_wake include/linux/sched/wake_q.h:93 [inline]) [<81a56298>] (preempt_schedule) from [<81a57ac0>] (__mutex_unlock_slowpath.constprop.0+0x1c0/0x1c8 kernel/locking/mutex.c:949) r7:85020000 r6:8501d400 r5:00000000 r4:82918808 [<81a57900>] (__mutex_unlock_slowpath.constprop.0) from [<81a57b08>] (mutex_unlock+0x40/0x44 kernel/locking/mutex.c:539) r9:00000000 r8:00000000 r7:ffffffff r6:e883ddc0 r5:e883de08 r4:e883ddc0 [<81a57ac8>] (mutex_unlock) from [<804e1134>] (_vm_unmap_aliases+0x208/0x240 mm/vmalloc.c:2901) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ab00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47a2000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe978c r4:84fe9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe978c r4:8454d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:8454d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d880 r8:8027f5e8 r7:e47b9e60 r6:8454d900 r5:85020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe883dfb0 to 0xe883dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:370:4359 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:370 state:D stack:0 pid:4359 tgid:4359 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eae71d84 r8:00000002 r7:60000013 r6:eae71d8c r5:851a8000 r4:851a8000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851a8000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae71e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d86c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851a8000 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc67000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:249:4360 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:249 state:D stack:0 pid:4360 tgid:4360 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eae49d84 r8:00000002 r7:60000113 r6:eae49d8c r5:85252400 r4:85252400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85252400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae49e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fa300 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85252400 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadf9000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8515b78c r4:8515b400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8515b78c r4:85213c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85252400 r8:85213cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85213c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85213c80 r8:8027f5e8 r7:eae69e60 r6:852b0780 r5:85252400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae49fb0 to 0xeae49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85207a00 INFO: task kworker/0:249:4360 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 7f754000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 90070013 ffffffff r5:90070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 r5:00001000 r4:ece91000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xe47b9fb0 to 0xe47b9ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:250:4363 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:250 state:D stack:0 pid:4363 tgid:4363 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eae75d84 r8:00000002 r7:60000013 r6:eae75d8c r5:85250c00 r4:85250c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85250c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:eae2f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8515bb8c r4:8515b800 r10:61c88647 r9:85250c00 r8:85213d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:851fa180 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:e47b9dc0 r4:00000000 r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 r5:85a7af8c r4:85a7ac00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 Not tainted 6.15.0-syzkaller #0 r4:85253c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae79e08 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8515bf8c r4:85213d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85253c00 r8:85213dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85213d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85213d80 r8:8027f5e8 r7:eae75e60 r6:852b0880 r5:85253c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae79fb0 to 0xeae79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851fa0c0 INFO: task kworker/0:251:4365 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 7fc85000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 90070013 ffffffff r5:90070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:252:4367 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:252 state:D stack:0 pid:4367 tgid:4367 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eae85d84 r8:00000002 r7:60000013 r6:eae85d8c r5:85255400 r4:85255400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85255400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae85e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fa680 r5:00001000 r4:eae87000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8516438c r4:85164000 r10:61c88647 r9:85255400 r8:85213e2c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe47b9d28 to 0xe47b9d70) 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 90070013 ffffffff r5:90070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:253:4369 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:253 state:D stack:0 pid:4369 tgid:4369 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eae95d84 r8:00000002 r7:60000113 r6:eae95d8c r5:85256c00 r4:85256c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85256c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae95e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fa800 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85256c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae97000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8516478c r4:85164400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85256c00 r8:85213eac r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:254:4372 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:254 state:D stack:0 pid:4372 tgid:4372 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eaeb1d84 r8:00000002 r7:60000113 r6:eaeb1d8c r5:85246c00 r4:85246c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85246c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaeb1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df2c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85246c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf2b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85166b8c r4:85166800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85166b8c r4:85213f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85246c00 r8:85213f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85213f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85213f00 r8:8027f5e8 r7:eae95e60 r6:852b0a00 r5:85246c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb1fb0 to 0xeaeb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851fa600 INFO: task kworker/0:254:4372 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 80349000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:255:4373 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:255 state:D stack:0 pid:4373 tgid:4373 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eaebdd84 r8:00000002 r7:60000013 r6:eaebdd8c r5:8524c800 r4:8524c800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8524c800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaebde08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fa900 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8524c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 r5:00001000 r4:eaea3000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8524c800 r8:85213fac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:82ac11a4 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Not tainted 6.15.0-syzkaller #0 r10:8291880c r9:eaec5d84 r8:00000002 r7:60000113 r6:eaec5d8c r5:85258000 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eaeb3000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85164f8c r4:85164c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85258000 r8:851ee02c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeaec5fb0 to 0xeaec5ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:82ac11a4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:257:4376 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:257 state:D stack:0 pid:4376 tgid:4376 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eaecdd84 r8:00000002 r7:60000113 r6:eaecdd8c r5:85258c00 r4:85258c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85258c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaecde08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fa880 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85258c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaec7000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8516538c r4:85165000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8516538c r4:851ee080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85258c00 r8:851ee0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851ee080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851ee080 r8:8027f5e8 r7:eaeb1e60 r6:852b0b80 r5:85258c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaecdfb0 to 0xeaecdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851fa880 INFO: task kworker/0:257:4376 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 80a01000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:8525b000 r4:82918808 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaee5e08 r9:83018005 r8:8525b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d9000 r5:00001000 r4:eaed7000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:851ee100 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 80a01000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:259:4380 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:259 state:D stack:0 pid:4380 tgid:4380 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eaef5d84 r8:00000002 r7:60000113 r6:eaef5d8c r5:8525bc00 r4:8525bc00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8525bc00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaef5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fae80 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8525bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0db000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaee7000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85165b8c r4:85165800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85165b8c r4:851ee180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8525bc00 r8:851ee1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851ee180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851ee180 r8:8027f5e8 r7:eaeb1e60 r6:852b0c80 r5:8525bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaef5fb0 to 0xeaef5ff8) 5fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:82ac11a4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:260:4382 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:260 state:D stack:0 pid:4382 tgid:4382 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eaf05d84 r8:00000002 r7:60000013 r6:eaf05d8c r5:85259800 r4:85259800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85259800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf05e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fafc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85259800 r7:00000000 r6:83018000 r5:00001000 r4:7f0dd000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaefb000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85165f8c r4:85165c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85165f8c r4:851ee200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85259800 r8:851ee22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:851ee200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851ee200 r8:8027f5e8 r7:eaeb1e60 r6:852b0d00 r5:85259800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf05fb0 to 0xeaf05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851fac80 INFO: task kworker/0:260:4382 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 8123a000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/0:261 state:D stack:0 pid:4385 tgid:4385 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf21e08 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:851ee280 r8:8027f5e8 r7:eaeb1e60 r6:852b0d80 r5:8525c800 INFO: task kworker/0:261:4385 is blocked on a mutex likely owned by task kworker/1:171:3869. 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 r4:00000000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:262:4387 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:262 state:D stack:0 pid:4387 tgid:4387 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eaf29d84 r8:00000002 r7:60000113 r6:eaf29d8c r5:8525d400 r4:8525d400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8525d400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf29e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8521f780 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8525d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafeb000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8516c38c r4:8516c000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8516c38c r4:851ee300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8525d400 r8:851ee32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:851ee300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851ee300 r8:8027f5e8 r7:eaeb1e60 r6:852b0e00 r5:8525d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf29fb0 to 0xeaf29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851df000 INFO: task kworker/0:262:4387 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 817ce000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 r5:85a7af8c r4:85a7ac00 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:8291880c r9:eab55d84 r8:00000002 r7:60000013 r6:eab55d8c r5:8525e000 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:dfcb3000 r5:8527b38c r4:8527b000 r4:852b0e80 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:82ac11a4 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:372:4396 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:372 state:D stack:0 pid:4396 tgid:4396 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eae6dd84 r8:00000002 r7:60000013 r6:eae6dd8c r5:8525ec00 r4:8525ec00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8525ec00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae6de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d89c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8525ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd81000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527bb8c r4:8527b800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8527bb8c r4:852b0f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8525ec00 r8:852b0fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852b0f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b0f80 r8:8027f5e8 r7:ead79e60 r6:851cf000 r5:8525ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae6dfb0 to 0xeae6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851d8740 INFO: task kworker/1:372:4396 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 8205f000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:8291880c r9:eab79d84 r8:00000002 r7:60000113 r6:eab79d8c r5:8525a400 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:dfddf000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeab79fb0 to 0xeab79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851d87c0 INFO: task kworker/1:373:4397 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 8241f000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Not tainted 6.15.0-syzkaller #0 r4:85253000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae81e08 r5:00001000 r4:dff4b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:851cf180 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:82ac11a4 r4:e47b9dc0 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:375:4401 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:375 state:D stack:0 pid:4401 tgid:4401 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eaf39d84 r8:00000002 r7:60000113 r6:eaf39d8c r5:85254800 r4:85254800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85254800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf39e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d8080 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85254800 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffbf000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529438c r4:85294000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8529438c r4:851cf280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85254800 r8:851cf2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851cf280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851cf280 r8:8027f5e8 r7:eae81e60 r6:851cf300 r5:85254800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf39fb0 to 0xeaf39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851d8ac0 INFO: task kworker/1:375:4401 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf3de08 r5:00001000 r4:e0097000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85260000 r8:851cf3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 9d60: 80230ad4 80239bb0 80070013 ffffffff r4:00000000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:263:4403 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:263 state:D stack:0 pid:4403 tgid:4403 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eaf41d84 r8:00000002 r7:60000113 r6:eaf41d8c r5:85260c00 r4:85260c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85260c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf41e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df400 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85260c00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df987000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85166f8c r4:85166c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85260c00 r8:851ee3ac r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 8323d000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf45e08 r5:00001000 r4:eadcb000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:8516738c r4:851ee400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe47b9d28 to 0xe47b9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe47b9fb0 to 0xe47b9ff8) Not tainted 6.15.0-syzkaller #0 r4:85263000 [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e0019000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 r4:00000000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:265:4407 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:265 state:D stack:0 pid:4407 tgid:4407 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eaf4dd84 r8:00000002 r7:60000113 r6:eaf4dd8c r5:85264800 r4:85264800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85264800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf4de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df6c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85264800 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85294f8c r4:85294c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85294f8c r4:851ee480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85264800 r8:851ee4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851ee480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851ee480 r8:8027f5e8 r7:eaf45e60 r6:851cf680 r5:85264800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf4dfb0 to 0xeaf4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851df500 INFO: task kworker/0:265:4407 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 83a6d000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:378 state:D stack:0 pid:4410 tgid:4410 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851cda80 r5:00001000 r4:e058d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85295b8c r4:85295800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85295b8c r4:851cf700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85265400 r8:851cf72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851cf700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851cf700 r8:8027f5e8 r7:eaf3de60 r6:851cf780 r5:85265400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf35fb0 to 0xeaf35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851cd240 INFO: task kworker/1:378:4410 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 83a6d000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-syzkaller #0 r5:85263c00 r4:82918808 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:e03eb000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:851cf800 r8:8027f5e8 r7:eaf35e60 r6:851cf880 r5:85263c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf55fb0 to 0xeaf55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851cd580 INFO: task kworker/1:379:4411 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 83a6d000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 r5:85a7af8c r4:85a7ac00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe47b9fb0 to 0xe47b9ff8) r4:84e5a340 INFO: task kworker/1:380:4414 blocked for more than 457 seconds. Workqueue: events bpf_prog_free_deferred r10:8291880c r9:eaf51d84 r8:00000002 r7:60000113 r6:eaf51d8c r5:85266000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf51e08 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018205 r8:85266000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 r5:00001000 r4:e0561000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529578c r4:85295400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8529578c r4:851cf900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85266000 r8:851cf92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851cf900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851cf900 r8:8027f5e8 r7:eaf35e60 r6:851cf980 r5:85266000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf51fb0 to 0xeaf51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851cd680 INFO: task kworker/1:380:4414 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 83efa000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:381:4417 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:381 state:D stack:0 pid:4417 tgid:4417 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eaf59d84 r8:00000002 r7:60000113 r6:eaf59d8c r5:85266c00 r4:00000000 r4:00000000 r5:00001000 r4:e05b9000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:382:4419 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:382 state:D stack:0 pid:4419 tgid:4419 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eaf61d84 r8:00000002 r7:60000113 r6:eaf61d8c r5:85262400 r4:85262400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85262400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf61e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851cd500 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85262400 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47af000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85296b8c r4:85296800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85296b8c r4:851cfb00 r10:61c88647 r9:85262400 r8:851cfb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 1fa0: 00000000 00000000 00000000 00000000 r4:851cda40 Workqueue: events bpf_prog_free_deferred r4:00000000 Exception stack(0xe47b9d28 to 0xe47b9d70) r4:82ac11a4 r4:00000000 r5:85a7af8c r4:85a7ac00 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:383:4420 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:383 state:D stack:0 pid:4420 tgid:4420 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eaf5dd84 r8:00000002 r7:60000013 r6:eaf5dd8c r5:85256000 r4:85256000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85256000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf5de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851cde00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85256000 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05ff000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529638c r4:85296000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8529638c r4:851cfc00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85256000 r8:851cfc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851cfc00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851cfc00 r8:8027f5e8 r7:eaf61e60 r6:851cfc80 r5:85256000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf5dfb0 to 0xeaf5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851cda40 INFO: task kworker/1:383:4420 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 84ada000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 r5:80070013 r4:80239bb0 r4:e47b9dc0 r5:00001000 r4:ece91000 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf65e08 r5:00001000 r4:e062f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8529678c r4:851cfd00 Exception stack(0xeaf65fb0 to 0xeaf65ff8) Workqueue: events bpf_prog_free_deferred 9d20: 84e02000 e8845000 00000001 80239b98 7f1c9000 00000001 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:385:4426 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:385 state:D stack:0 pid:4426 tgid:4426 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eaf6dd84 r8:00000002 r7:60000013 r6:eaf6dd8c r5:852e8c00 r4:852e8c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852e8c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf6de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d8bc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852e8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47d7000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85296f8c r4:85296c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85296f8c r4:851cfe00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852e8c00 r8:851cfe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851cfe00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851cfe00 r8:8027f5e8 r7:eaf61e60 r6:851cfe80 r5:852e8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf6dfb0 to 0xeaf6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851cdec0 INFO: task kworker/1:385:4426 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 84e02000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf69e08 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85212d00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852e9800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead6b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529f78c r4:8529f400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529f78c r4:851ee500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852e9800 r8:851ee52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:851ee500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851ee500 r8:8027f5e8 r7:eaf45e60 r6:851cff00 r5:852e9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf69fb0 to 0xeaf69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851dfc00 INFO: task kworker/0:266:4427 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 85262000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:386:4428 blocked for more than 457 seconds. Workqueue: events bpf_prog_free_deferred r10:8291880c r9:eaf71d84 r8:00000002 r7:60000013 r6:eaf71d8c r5:852ea400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf71e08 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8817000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 Call trace: 9d20: 853e0000 e8845000 00000001 80239b98 7f1c9000 00000001 r4:00000000 r5:85a7af8c r4:85a7ac00 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e5a340 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf79e08 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47ef000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529738c r4:85297000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8529738c r4:851f6080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852eb000 r8:851f60ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851f6080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f6080 r8:8027f5e8 r7:eaf71e60 r6:851f6100 r5:852eb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf79fb0 to 0xeaf79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851f4000 INFO: task kworker/1:387:4429 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 85729000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:388:4432 blocked for more than 457 seconds. Workqueue: events bpf_prog_free_deferred r10:8291880c r9:eaf75d84 r8:00000002 r7:60000113 r6:eaf75d8c r5:852ebc00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf75e08 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018205 r8:852ebc00 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 r5:00001000 r4:ea881000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85297b8c r4:851f6180 r10:00000000 r9:851f6180 r8:8027f5e8 r7:eaf71e60 r6:851f6200 r5:852ebc00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:00000000 r5:00001000 r4:ece91000 r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:389:4435 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:389 state:D stack:0 pid:4435 tgid:4435 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eaf81d84 r8:00000002 r7:60000013 r6:eaf81d8c r5:852ec800 r4:852ec800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852ec800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf81e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f4880 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852ec800 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9e9000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529c38c r4:8529c000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8529c38c r4:851f6280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852ec800 r8:851f62ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851f6280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f6280 r8:8027f5e8 r7:eaf75e60 r6:851f6300 r5:852ec800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf81fb0 to 0xeaf81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851f43c0 INFO: task kworker/1:389:4435 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 85a7f000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:390:4436 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:390 state:D stack:0 pid:4436 tgid:4436 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eaf7dd84 r8:00000002 r7:60000113 r6:eaf7dd8c r5:852ed400 r4:852ed400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852ed400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf7de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f46c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852ed400 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9c7000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85297f8c r4:85297c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85297f8c r4:851f6380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852ed400 r8:851f63ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851f6380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f6380 r8:8027f5e8 r7:eaf81e60 r6:851f6400 r5:852ed400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf7dfb0 to 0xeaf7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851f4680 INFO: task kworker/1:390:4436 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 85a7f000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:391:4438 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:391 state:D stack:0 pid:4438 tgid:4438 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eaf85d84 r8:00000002 r7:60000013 r6:eaf85d8c r5:852ee000 r4:852ee000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852ee000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf85e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f49c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852ee000 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa05000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529c78c r4:8529c400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8529c78c r4:851f6480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852ee000 r8:851f64ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851f6480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f6480 r8:8027f5e8 r7:eaf81e60 r6:851f6500 r5:852ee000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf85fb0 to 0xeaf85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851f43c0 INFO: task kworker/1:391:4438 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 85bef000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:392:4440 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:392 state:D stack:0 pid:4440 tgid:4440 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eaf8dd84 r8:00000002 r7:60000113 r6:eaf8dd8c r5:852eec00 r4:852eec00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852eec00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf8de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f4b40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852eec00 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa27000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529cb8c r4:8529c800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8529cb8c r4:851f6580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852eec00 r8:851f65ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851f6580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f6580 r8:8027f5e8 r7:eaf85e60 r6:851f6600 r5:852eec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf8dfb0 to 0xeaf8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851f4840 INFO: task kworker/1:392:4440 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 85e1b000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:393:4442 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:393 state:D stack:0 pid:4442 tgid:4442 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eaf91d84 r8:00000002 r7:60000013 r6:eaf91d8c r5:852f8000 r4:852f8000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852f8000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf91e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f4fc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852f8000 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa7f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529d78c r4:8529d400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8529d78c r4:851f6680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852f8000 r8:851f66ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851f6680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f6680 r8:8027f5e8 r7:eaf8de60 r6:851f6700 r5:852f8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf91fb0 to 0xeaf91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851f4940 INFO: task kworker/1:393:4442 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 85e1b000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 r4:e47b9dc0 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 INFO: task kworker/1:394:4443 blocked for more than 457 seconds. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:394 state:D stack:0 pid:4443 tgid:4443 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eaf89d84 r8:00000002 r7:60000013 r6:eaf89d8c r5:852f8c00 r4:852f8c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852f8c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf89e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f4cc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852f8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa3d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529cf8c r4:8529cc00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8529cf8c r4:851f6780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852f8c00 r8:851f67ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851f6780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851f4940 INFO: task kworker/1:394:4443 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 865ab000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85a7af8c r4:85a7ac00 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r4:00000000 r5:00001000 r4:eaa5d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:852f9800 r8:851f68ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851f4d40 Call trace: 9d20: 867a5000 e8845000 00000001 80239b98 7f1c9000 00000001 r4:00000000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:396:4448 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:396 state:D stack:0 pid:4448 tgid:4448 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eaf9dd84 r8:00000002 r7:60000013 r6:eaf9dd8c r5:852fa400 r4:852fa400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852fa400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf9de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85212040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852fa400 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa95000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529db8c r4:8529d800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8529db8c r4:851f6980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852fa400 r8:851f69ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851f6980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f6980 r8:8027f5e8 r7:eaf91e60 r6:851f6a00 r5:852fa400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf9dfb0 to 0xeaf9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85212000 INFO: task kworker/1:396:4448 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r5:80070013 r4:80239bb0 r5:85a7af8c r4:85a7ac00 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:397:4449 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:397 state:D stack:0 pid:4449 tgid:4449 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:00001000 r4:eaabb000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 9d20: 86a49000 e8845000 00000001 80239b98 7f1c9000 00000001 r5:00001000 r4:ece91000 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/1:398 state:D stack:0 pid:4452 tgid:4452 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:852fbc00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852fbc00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafa5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85212840 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852fbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab47000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xeafa5fb0 to 0xeafa5ff8) [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Call trace: r4:00000000 r5:00001000 r4:eaae3000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:85a7af8c r4:85a7ac00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:400:4455 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:400 state:D stack:0 pid:4455 tgid:4455 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eafb1d84 r8:00000002 r7:60000013 r6:eafb1d8c r5:851ac800 r4:851ac800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851ac800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafb1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85212700 r5:00001000 r4:eab05000 r7:ddde2d80 r6:83018200 r5:8529e78c r4:851f6d00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:8291880c r9:eafa9d84 r8:00000002 r7:60000013 r6:eafa9d8c r5:852fc800 r4:00000000 r5:00001000 r4:eab59000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Call trace: r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafb5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f3940 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852fe000 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac1d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8516678c r4:85166400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8516678c r4:851f6e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852fe000 r8:851f6eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851f6e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f6e80 r8:8027f5e8 r7:eafa9e60 r6:851f6f00 r5:852fe000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafb5fb0 to 0xeafb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85212740 INFO: task kworker/1:402:4460 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:00001000 r4:ece91000 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:eab9d000 r7:ddde2d80 r6:83018200 r5:8529f38c r4:8521d000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852fec00 r8:8521d02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8521d000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8521d000 r8:8027f5e8 r7:eafb5e60 r6:8521d080 r5:852fec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf99fb0 to 0xeaf99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85212b00 INFO: task kworker/1:403:4461 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 87b4c000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 r5:80070013 r4:80239bb0 r5:00001000 r4:ece91000 r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 Workqueue: events bpf_prog_free_deferred [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:eac45000 r7:ddde2d80 r6:83018200 r5:8529fb8c r4:8521d100 r4:85212d40 r4:00000000 r5:80070013 r4:80239bb0 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:267 state:D stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eafb9d84 r8:00000002 r7:60000113 r6:eafb9d8c r5:851ad400 r4:851ad400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851ad400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafb9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8521f300 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851ad400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafc7000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8516778c r4:85167400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8516778c r4:851ee680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851ad400 r8:851ee6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851ee680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851ee680 r8:8027f5e8 r7:eaf45e60 r6:851ee700 r5:851ad400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafb9fb0 to 0xeafb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:e47b9dc0 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafc5e08 r5:00001000 r4:eafd3000 r7:dddced80 r6:83018000 r5:85167b8c r4:851ee780 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 9d60: 80230ad4 80239bb0 80070013 ffffffff [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:269:4469 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:269 state:D stack:0 pid:4469 tgid:4469 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eafd1d84 r8:00000002 r7:60000113 r6:eafd1d8c r5:851ae000 r4:851ae000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851ae000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafd1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8521f600 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851ae000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafdf000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85167f8c r4:85167c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85167f8c r4:851ee880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851ae000 r8:851ee8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851ee880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851ee880 r8:8027f5e8 r7:eafc5e60 r6:851ee900 r5:851ae000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafd1fb0 to 0xeafd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8521f280 INFO: task kworker/0:269:4469 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) task:kworker/0:270 state:D stack:0 pid:4471 tgid:4471 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r5:00001000 r4:df95d000 r7:dddced80 r6:83018000 r5:8516c78c r4:851ee980 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8521f400 INFO: task kworker/0:270:4471 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 88bb0000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/0:271 state:D stack:0 pid:4476 tgid:4476 ppid:2 task_flags:0x4208060 flags:0x00000000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:00001000 r4:ece91000 r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 Call trace: [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:dfb71000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8516cf8c r4:8516cc00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8516cf8c r4:851eeb80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851aa400 r8:851eebac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851eeb80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851eeb80 r8:8027f5e8 r7:eafe9e60 r6:851eec00 r5:851aa400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaff5fb0 to 0xeaff5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8521f840 INFO: task kworker/0:272:4478 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 88d42000 e8845000 00000001 80239b98 7f1c9000 00000001 9d60: 80230ad4 80239bb0 80070013 ffffffff r4:00000000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac39e08 r5:00001000 r4:dfe4f000 r7:dddced80 r6:83018000 r5:8516d78c r4:851eec80 r4:8521fc00 Workqueue: events bpf_prog_free_deferred 9d20: 89184000 e8845000 00000001 80239b98 7f1c9000 00000001 r4:00000000 r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:274:4482 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:274 state:D stack:0 pid:4482 tgid:4482 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eac69d84 r8:00000002 r7:60000113 r6:eac69d8c r5:85268000 r4:85268000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85268000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac69e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8521fcc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85268000 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc27000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8516d38c r4:8516d000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8516d38c r4:851eed80 9fa0: 00000000 00000000 00000000 00000000 9d20: 89184000 e8845000 00000001 80239b98 7f1c9000 00000001 r5:85a7af8c r4:85a7ac00 r4:00000001 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:82ac11a4 r5:00001000 r4:ece91000 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/0:276 state:D stack:0 pid:4485 tgid:4485 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae9de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f4f80 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852f0000 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e065d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8516df8c r4:8516dc00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8516df8c r4:851eef80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852f0000 r8:851eefac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851eef80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851eef80 r8:8027f5e8 r7:eafbde60 r6:8521d200 r5:852f0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae9dfb0 to 0xeae9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8521fe80 INFO: task kworker/0:276:4485 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 89b1d000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85a7af8c r4:85a7ac00 9fa0: 00000000 00000000 00000000 00000000 r4:852f2400 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f1080 r5:8516e38c r4:8516e000 r10:00000000 r9:851fe000 r8:8027f5e8 r7:eae9de60 r6:8521d280 r5:852f2400 Call trace: r5:80070013 r4:80239bb0 r5:00001000 r4:ece91000 r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r10:8291880c r9:eaeb9d84 r8:00000002 r7:60000113 r6:eaeb9d8c r5:852f1800 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f14c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852f1800 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0725000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8516eb8c r4:8516e800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8516eb8c r4:851fe080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852f1800 r8:851fe0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851fe080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fe080 r8:8027f5e8 r7:eaeade60 r6:8521d300 r5:852f1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851f1200 INFO: task kworker/0:278:4489 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r5:85a7af8c r4:85a7ac00 9fa0: 00000000 00000000 00000000 00000000 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:e06f9000 r10:61c88647 r9:85269800 r8:851fe12c r7:82804d40 r6:dddced80 r5:dddceda0 Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:280 state:D stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eaed1d84 r8:00000002 r7:60000113 r6:eaed1d8c r5:8526a400 r4:8526a400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8526a400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaed1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f1740 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8526a400 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 r5:00001000 r4:ea8ed000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8526a400 r8:851fe22c r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851f1140 INFO: task kworker/0:280:4493 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 8a642000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r4:00000000 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:ea8c1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8516ef8c r4:851fe300 Exception stack(0xeaed5fb0 to 0xeaed5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851f1480 INFO: task kworker/0:281:4495 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 8a8e0000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:85a7af8c r4:85a7ac00 r4:00000001 INFO: task kworker/0:282:4498 blocked for more than 458 seconds. [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ea929000 r7:dddced80 r6:83018000 r5:8516f78c r4:851fe400 r4:851f15c0 9d20: 8a8e0000 e8845000 00000001 80239b98 7f1c9000 00000001 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:ea959000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8516fb8c r4:8516f800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8516fb8c r4:851fe500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8526d400 r8:851fe52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:851fe500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fe500 r8:8027f5e8 r7:eaedde60 r6:851fe580 r5:8526d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae91fb0 to 0xeae91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851f16c0 INFO: task kworker/0:283:4499 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 8addf000 e8845000 00000001 80239b98 7f1c9000 00000001 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:00001000 r4:eabcd000 r7:dddced80 r6:83018000 r5:8516ff8c r4:851fe600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8526ec00 r8:851fe62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:851fe600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fe600 r8:8027f5e8 r7:eae91e60 r6:851fe680 r5:8526ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaef9fb0 to 0xeaef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851f1a80 INFO: task kworker/0:284:4502 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 8b2db000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:8526bc00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf01e08 r5:00001000 r4:eac89000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8517838c r4:85178000 r10:00000000 r9:851fe700 r8:8027f5e8 r7:eaef9e60 r6:851fe780 r5:8526bc00 Workqueue: events bpf_prog_free_deferred 9d20: 8b2db000 e8845000 00000001 80239b98 7f1c9000 00000001 r4:e47b9dc0 r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e5a340 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf11e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851c8480 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:846f0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc8b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8532878c r4:85328400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8532878c r4:8521d380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:846f0c00 r8:8521d3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 8bba2000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:00000000 r4:00000000 r5:00001000 r4:eacad000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8517878c r4:851fe880 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 8bba2000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:406:4507 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:406 state:D stack:0 pid:4507 tgid:4507 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eaf09d84 r8:00000002 r7:60000113 r6:eaf09d8c r5:852f5400 [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eac7d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeaf09fb0 to 0xeaf09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851f3b40 INFO: task kworker/1:406:4507 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 8bba2000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85a7af8c r4:85a7ac00 r4:8454d780 Exception stack(0xe47b9fb0 to 0xe47b9ff8) INFO: task kworker/1:407:4510 blocked for more than 458 seconds. r4:852f6000 r4:00000000 r4:00000000 r5:00001000 r4:eae55000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeaf1dfb0 to 0xeaf1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851f3c40 INFO: task kworker/1:407:4510 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 8c004000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e5a340 r10:8291880c r9:eb005d84 r8:00000002 r7:60000113 r6:eb005d8c r5:852f3000 r5:00001000 r4:ead3f000 r7:dddced80 r6:83018000 r5:8517978c r4:851fe980 r4:851d4280 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:00000000 r5:00001000 r4:eace9000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/0:289 state:D stack:0 pid:4516 tgid:4516 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r9:83018005 r8:84cd8000 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead15000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85178f8c r4:85178c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85178f8c r4:851fea00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84cd8000 r8:851fea2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:851fea00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fea00 r8:8027f5e8 r7:eb005e60 r6:8521d780 r5:84cd8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb011fb0 to 0xeb011ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851d4100 INFO: task kworker/0:289:4516 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r5:85a7af8c r4:85a7ac00 r4:8454d780 9fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:290 state:D stack:0 pid:4519 tgid:4519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb01dd84 r8:00000002 r7:60000013 r6:eb01dd8c r5:84cda400 r4:84cda400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cda400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ead2f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8517938c r4:851fea80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-syzkaller #0 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:dfefb000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8517b78c r4:8517b400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:851d4400 [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 8cc5a000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:292:4522 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:292 state:D stack:0 pid:4522 tgid:4522 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:846f2400 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d4800 r5:00001000 r4:ead55000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xeb019fb0 to 0xeb019ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82ac11a4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:293:4525 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:293 state:D stack:0 pid:4525 tgid:4525 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eaffdd84 r8:00000002 r7:60000013 r6:eaffdd8c r5:846f3c00 r4:846f3c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:846f3c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaffde08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d49c0 r5:00001000 r4:ead71000 r7:dddced80 r6:83018000 r5:85179f8c r4:851fed00 task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 8d0f3000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:294:4526 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:294 state:D stack:0 pid:4526 tgid:4526 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:846f4800 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d4c00 r5:00001000 r4:eae09000 r7:dddced80 r6:83018000 r5:8517a38c r4:851fee00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 8d27c000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe47b9fb0 to 0xe47b9ff8) r4:84e5a340 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d4d00 r5:00001000 r4:eae31000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8517a78c r4:8517a400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:846f3000 r8:851fef2c r7:82804d40 r6:dddced80 r5:dddceda0 9fa0: 00000000 00000000 00000000 00000000 r4:851d4c40 Workqueue: events bpf_prog_free_deferred r4:00000000 9d20: 8d27c000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:296:4530 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:296 state:D stack:0 pid:4530 tgid:4530 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb02dd84 r8:00000002 r7:60000113 r6:eb02dd8c r5:84cdb000 r4:84cdb000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cdb000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb02de08 r4:00000000 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:eae89000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8517af8c r4:851bf000 Exception stack(0xeb02dfb0 to 0xeb02dff8) Workqueue: events bpf_prog_free_deferred 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:408:4532 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:408 state:D stack:0 pid:4532 tgid:4532 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb021d84 r8:00000002 r7:60000113 r6:eb021d8c r5:84cd8c00 r4:84cd8c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cd8c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:84cd8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 r5:00001000 r4:dfa2b000 r7:ddde2d80 r6:83018200 r5:8532838c r4:8521d900 1fa0: 00000000 00000000 00000000 00000000 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 Not tainted 6.15.0-syzkaller #0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:dfd93000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8517b38c r4:8517b000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8517b38c r4:851bf080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:851f1800 9d60: 80230ad4 80239bb0 80070013 ffffffff r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r7:ddde2d80 r6:83018200 r5:85328b8c r4:8521da00 r4:851c8500 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eafd9d84 r8:00000002 r7:60000013 r6:eafd9d8c r5:8526e000 r4:8526e000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8526e000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafd9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851c8a40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8526e000 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03e9000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8532938c r4:85329000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:e47b9dc0 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r7:dddced80 r6:83018000 r5:853a078c r4:851bf280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851bf280 r8:8027f5e8 r7:eaff9e60 r6:851bf300 r5:846f0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafcdfb0 to 0xeafcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851c7240 INFO: task kworker/0:298:4542 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 9d60: 80230ad4 80239bb0 80070013 ffffffff r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:00000000 r4:00000000 r5:00001000 r4:dffad000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8517bb8c r4:8517b800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8517bb8c r4:851bf380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:846f6c00 r8:851bf3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851bf380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851bf380 r8:8027f5e8 r7:eafcde60 r6:851bf400 r5:846f6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb031fb0 to 0xeb031ff8) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:e47b9dc0 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r5:844b0000 r4:82918808 r5:00001000 r4:e03a5000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r5:80070013 r4:80239bb0 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:300:4547 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:300 state:D stack:0 pid:4547 tgid:4547 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eaf15d84 r8:00000002 r7:60000113 r6:eaf15d8c r5:844b0c00 r4:844b0c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844b0c00 r4:82918808 r4:00000000 r5:00001000 r4:e005f000 r5:8517bf8c r4:8517bc00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:82ac11a4 r5:85a7af8c r4:85a7ac00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ef1c0 r4:851bf600 task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85a7af8c r4:85a7ac00 r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851c8b80 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:844b2400 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e056b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8532978c r4:85329400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8532978c r4:8521db80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844b2400 r8:8521dbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8521db80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8521db80 r8:8027f5e8 r7:eafd9e60 r6:851bf700 r5:844b2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb039fb0 to 0xeb039ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851c8740 INFO: task kworker/1:412:4552 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 8f3ef000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:8291880c r9:eb045d84 r8:00000002 r7:60000113 r6:eb045d8c r5:844b4800 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851c8c80 r5:00001000 r4:e05ab000 r7:ddde2d80 r6:83018200 r5:85329b8c r4:8521dc00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e47b9dc0 r5:00001000 r4:ece91000 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:8291880c r9:eb049d84 r8:00000002 r7:60000013 r6:eb049d8c r5:844b3000 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:e05eb000 r7:ddde2d80 r6:83018200 r5:85329f8c r4:8521dc80 Exception stack(0xeb049fb0 to 0xeb049ff8) r4:851c8a80 [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 8f67d000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:415:4558 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:415 state:D stack:0 pid:4558 tgid:4558 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb051d84 r8:00000002 r7:60000113 r6:eb051d8c r5:844b3c00 r4:844b3c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844b3c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb051e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:e8851000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8532af8c r4:8532ac00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:82ac11a4 r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 INFO: task kworker/1:416:4559 blocked for more than 458 seconds. r4:84cdc800 r4:00000000 r9:83018205 r8:84cdc800 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 r5:00001000 r4:e076b000 r7:ddde2d80 r6:83018200 r5:8532a38c r4:8521dd80 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851c8a80 INFO: task kworker/1:416:4559 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 8f9df000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:417:4562 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:417 state:D stack:0 pid:4562 tgid:4562 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb04dd84 r8:00000002 r7:60000113 r6:eb04dd8c r5:84cde000 r4:84cde000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cde000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851c8580 r5:00001000 r4:e47c3000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8521de80 r8:8027f5e8 r7:eb051e60 r6:8521df00 r5:84cde000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851be040 r5:00001000 r4:e47e9000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8532ab8c r4:8532a800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8532ab8c r4:8521df80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84cdec00 r8:8521dfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8521df80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8521df80 r8:8027f5e8 r7:eb051e60 r6:851f6f80 r5:84cdec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb055fb0 to 0xeb055ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851be1c0 INFO: task kworker/1:418:4564 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 90145000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:8454d780 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:419 state:D stack:0 pid:4566 tgid:4566 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:ea939000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:8532b38c r4:851c6000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84cdd400 r8:851c602c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851c6000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c6000 r8:8027f5e8 r7:eb051e60 r6:851c6080 r5:84cdd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb059fb0 to 0xeb059ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851be100 INFO: task kworker/1:419:4566 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 90145000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:84cdbc00 r4:82918808 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851be740 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84cdbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa0b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8532bb8c r4:8532b800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8532bb8c r4:851c6100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84cdbc00 r8:851c612c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851c6100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c6100 r8:8027f5e8 r7:eb059e60 r6:851c6180 r5:84cdbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb03dfb0 to 0xeb03dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851be100 INFO: task kworker/1:420:4567 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 9d20: 905cf000 e8845000 00000001 80239b98 7f1c9000 00000001 r4:e47b9dc0 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84cd9800 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851be640 r5:00001000 r4:ea9e7000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:82ac11a4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eaa57000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8533038c r4:851c6300 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851be4c0 INFO: task kworker/1:422:4572 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 90a9a000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:423:4573 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:423 state:D stack:0 pid:4573 tgid:4573 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb06dd84 r8:00000002 r7:60000013 r6:eb06dd8c r5:852f3c00 r4:852f3c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852f3c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:eaa37000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:851be840 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:82ac11a4 r4:00000000 r5:85a7af8c r4:85a7ac00 r4:8454d780 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eaa9d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb071fb0 to 0xeb071ff8) task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 9d60: 80230ad4 80239bb0 80070013 ffffffff r4:e47b9dc0 r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:425:4578 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:425 state:D stack:0 pid:4578 tgid:4578 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb079d84 r8:00000002 r7:60000113 r6:eb079d8c r5:844b6c00 r4:844b6c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844b6c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb079e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851be980 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:844b6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa81000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533078c r4:85330400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533078c r4:851c6600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844b6c00 r8:851c662c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851c6600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c6600 r8:8027f5e8 r7:eb071e60 r6:851bf900 r5:844b6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb079fb0 to 0xeb079ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851bea40 INFO: task kworker/1:425:4578 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 91416000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:84c88000 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 r5:00001000 r4:eaadd000 r7:ddde2d80 r6:83018200 r5:85330f8c r4:851c6680 r4:00000001 r4:851bed00 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:82ac11a4 r4:00000000 r5:85a7af8c r4:85a7ac00 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 INFO: task kworker/1:427:4582 blocked for more than 459 seconds. r10:8291880c r9:eb089d84 r8:00000002 r7:60000113 r6:eb089d8c r5:84c89800 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab21000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533138c r4:85331000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533138c r4:851c6700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c89800 r8:851c672c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851c6700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c6700 r8:8027f5e8 r7:eb081e60 r6:851bfa00 r5:84c89800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb089fb0 to 0xeb089ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851c7ec0 INFO: task kworker/1:427:4582 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 91416000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Call trace: [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab51000 r5:8533178c r4:85331400 r10:61c88647 r9:84c8a400 r8:851c67ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:e47b9dc0 r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:429 state:D stack:0 pid:4585 tgid:4585 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f82c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84c88c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead6d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85331f8c r4:85331c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85331f8c r4:851c6800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c88c00 r8:851c682c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851c6800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c6800 r8:8027f5e8 r7:eb08de60 r6:851bfb00 r5:84c88c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb095fb0 to 0xeb095ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851c8140 INFO: task kworker/1:429:4585 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 91bae000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ece91000 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fa0: 00000000 00000000 00000000 00000000 Call trace: [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:84c8b000 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 r5:00001000 r4:eab81000 r5:85331b8c r4:85331800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:82ac11a4 r4:00000000 r5:85a7af8c r4:85a7ac00 r4:8454d780 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0a9e08 r5:00001000 r4:eb0d9000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:82ac11a4 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:432:4591 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:432 state:D stack:0 pid:4591 tgid:4591 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb0add84 r8:00000002 r7:60000113 r6:eb0add8c r5:84c8e000 r4:84c8e000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c8e000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0ade08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f8440 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84c8e000 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadf7000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533238c r4:85332000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533238c r4:851c6980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c8e000 r8:851c69ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851c6980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c6980 r8:8027f5e8 r7:eb0a9e60 r6:851bfc80 r5:84c8e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0adfb0 to 0xeb0adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851f8140 INFO: task kworker/1:432:4591 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 9d20: 92582000 e8845000 00000001 80239b98 7f1c9000 00000001 r4:00000000 r5:85a7af8c r4:85a7ac00 r4:8454d780 9fa0: 00000000 00000000 00000000 00000000 Call trace: [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eaed9000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8533278c r4:851c6a00 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 92582000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:434:4595 blocked for more than 459 seconds. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eaefd000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe47b9fb0 to 0xe47b9ff8) Not tainted 6.15.0-syzkaller #0 r4:85380000 r4:00000000 r9:83018205 r8:85380000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 r5:00001000 r4:eaf23000 r7:ddde2d80 r6:83018200 r5:85332f8c r4:851c6b00 Exception stack(0xeb0c9fb0 to 0xeb0c9ff8) task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 92c0c000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:436:4599 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:436 state:D stack:0 pid:4599 tgid:4599 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb065d84 r8:00000002 r7:60000113 r6:eb065d8c r5:85300000 r4:85300000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85300000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb065e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f8940 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85300000 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafd5000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533338c r4:85333000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533338c r4:851c6b80 r10:61c88647 r9:85300000 r8:851c6bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:851f8600 Workqueue: events bpf_prog_free_deferred Exception stack(0xe47b9d28 to 0xe47b9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:8291880c r9:eb0d1d84 r8:00000002 r7:60000113 r6:eb0d1d8c r5:85302400 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f8ac0 r5:00001000 r4:eb0cd000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533378c r4:851c6c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85302400 r8:851c6cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851c6c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c6c80 r8:8027f5e8 r7:eb0a9e60 r6:851c6d00 r5:85302400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0d1fb0 to 0xeb0d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851f87c0 INFO: task kworker/1:437:4602 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 93218000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:438:4604 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:438 state:D stack:0 pid:4604 tgid:4604 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb0ddd84 r8:00000002 r7:60000113 r6:eb0ddd8c r5:85303000 r4:85303000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85303000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0dde08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f8d40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85303000 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0e5000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85333f8c r4:85333c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85333f8c r4:851c6d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85303000 r8:851c6dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851c6d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c6d80 r8:8027f5e8 r7:eb0a9e60 r6:851c6e00 r5:85303000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0ddfb0 to 0xeb0ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851f8a40 INFO: task kworker/1:438:4604 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 933d4000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 r4:82ac11a4 r4:00000000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r4:84e5a340 Workqueue: events bpf_prog_free_deferred r5:85303c00 r4:82918808 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eac29000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85334f8c r4:85334c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85334f8c r4:851c6e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85303c00 r8:851c6eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851c6e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c6e80 r8:8027f5e8 r7:eb0dde60 r6:851c6f00 r5:85303c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0e9fb0 to 0xeb0e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851f8b40 INFO: task kworker/1:439:4606 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 93a2f000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:440:4607 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:440 state:D stack:0 pid:4607 tgid:4607 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb075d84 r8:00000002 r7:60000113 r6:eb075d8c r5:85304800 r4:85304800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85304800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb075e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f8ec0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85304800 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0f1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533438c r4:85334000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533438c r4:851c6f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85304800 r8:851c6fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851c6f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c6f80 r8:8027f5e8 r7:eb0e9e60 r6:85229000 r5:85304800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb075fb0 to 0xeb075ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851f8b40 INFO: task kworker/1:440:4607 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 93fba000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:302:4612 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:302 state:D stack:0 pid:4612 tgid:4612 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eaea9d84 r8:00000002 r7:60000013 r6:eaea9d8c r5:85306000 r4:85306000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85306000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaea9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85215040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85306000 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06e1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a178c r4:853a1400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a178c r4:851bfe80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85306000 r8:851bfeac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851bfe80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851bfe80 r8:8027f5e8 r7:eafcde60 r6:85229080 r5:85306000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaea9fb0 to 0xeaea9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851ef4c0 INFO: task kworker/0:302:4612 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 9440a000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:303:4613 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:303 state:D stack:0 pid:4613 tgid:4613 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb001d84 r8:00000002 r7:60000013 r6:eb001d8c r5:85305400 r4:85305400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85305400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb001e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851efe40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85305400 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a0b8c r4:853a0800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a0b8c r4:851bff00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85305400 r8:851bff2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:851bff00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851bff00 r8:8027f5e8 r7:eaea9e60 r6:85229100 r5:85305400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb001fb0 to 0xeb001ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851ef4c0 INFO: task kworker/0:303:4613 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 947af000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:304:4615 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:304 state:D stack:0 pid:4615 tgid:4615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb109d84 r8:00000002 r7:60000113 r6:eb109d8c r5:85308000 r4:85308000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85308000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb109e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f8f80 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85308000 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecd000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a0f8c r4:853a0c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a0f8c r4:851bff80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85308000 r8:851bffac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851bff80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851bff80 r8:8027f5e8 r7:eaea9e60 r6:85229180 r5:85308000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb109fb0 to 0xeb109ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851f8f40 INFO: task kworker/0:304:4615 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 94b85000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:305:4617 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:305 state:D stack:0 pid:4617 tgid:4617 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb111d84 r8:00000002 r7:60000013 r6:eb111d8c r5:85309800 r4:85309800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85309800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb111e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d99f40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85309800 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0691000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a138c r4:853a1000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a138c r4:85223000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85309800 r8:8522302c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85223000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85223000 r8:8027f5e8 r7:eaea9e60 r6:85229200 r5:85309800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb111fb0 to 0xeb111ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d99e40 INFO: task kworker/0:305:4617 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 94e88000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:441:4618 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:441 state:D stack:0 pid:4618 tgid:4618 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb115d84 r8:00000002 r7:60000113 r6:eb115d8c r5:8530a400 r4:8530a400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8530a400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb115e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85228b40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8530a400 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea8d1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533478c r4:85334400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533478c r4:85229280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8530a400 r8:852292ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85229280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85229280 r8:8027f5e8 r7:eb0e9e60 r6:85229300 r5:8530a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb115fb0 to 0xeb115ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852282c0 INFO: task kworker/1:441:4618 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 95491000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:306:4621 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:306 state:D stack:0 pid:4621 tgid:4621 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb121d84 r8:00000002 r7:60000013 r6:eb121d8c r5:85308c00 r4:85308c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85308c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb121e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85215d00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85308c00 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacb9000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a2f8c r4:853a2c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a2f8c r4:85223080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85308c00 r8:852230ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85223080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85223080 r8:8027f5e8 r7:eaea9e60 r6:85229380 r5:85308c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb121fb0 to 0xeb121ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85215080 INFO: task kworker/0:306:4621 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 95aa1000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe47b9fb0 to 0xe47b9ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb125d84 r8:00000002 r7:60000113 r6:eb125d8c r5:8530b000 r4:8530b000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8530b000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb125e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85215340 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8530b000 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0741000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a1b8c r4:853a1800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a1b8c r4:85223100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8530b000 r8:8522312c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85223100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85223100 r8:8027f5e8 r7:eb121e60 r6:85229400 r5:8530b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb125fb0 to 0xeb125ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85215080 INFO: task kworker/0:307:4622 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 95fc4000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:308:4625 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:308 state:D stack:0 pid:4625 tgid:4625 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb101d84 r8:00000002 r7:60000013 r6:eb101d8c r5:8530c800 r4:8530c800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8530c800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb101e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852154c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8530c800 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea91d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a1f8c r4:853a1c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a1f8c r4:85223180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8530c800 r8:852231ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85223180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85223180 r8:8027f5e8 r7:eb121e60 r6:85229480 r5:8530c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb101fb0 to 0xeb101ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85215400 INFO: task kworker/0:308:4625 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 95fc4000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:442:4627 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:442 state:D stack:0 pid:4627 tgid:4627 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb129d84 r8:00000002 r7:60000113 r6:eb129d8c r5:8530d400 r4:8530d400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8530d400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb129e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85228e40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8530d400 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabf1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85334b8c r4:85334800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85334b8c r4:85229500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8530d400 r8:8522952c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85229500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85229500 r8:8027f5e8 r7:eb0e9e60 r6:85229580 r5:8530d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb129fb0 to 0xeb129ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85228a80 INFO: task kworker/1:442:4627 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 96d55000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:309:4628 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:309 state:D stack:0 pid:4628 tgid:4628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb12dd84 r8:00000002 r7:60000013 r6:eb12dd8c r5:8530e000 r4:8530e000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8530e000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb12de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85215680 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8530e000 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea961000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a238c r4:853a2000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a238c r4:85223200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8530e000 r8:8522322c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85223200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85223200 r8:8027f5e8 r7:eb121e60 r6:85229600 r5:8530e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb12dfb0 to 0xeb12dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85215500 INFO: task kworker/0:309:4628 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 96d55000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:310:4630 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:310 state:D stack:0 pid:4630 tgid:4630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb0f5d84 r8:00000002 r7:60000113 r6:eb0f5d8c r5:85382400 r4:85382400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85382400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0f5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85215a00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85382400 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac59000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a278c r4:853a2400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a278c r4:85223280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85382400 r8:852232ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85223280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85223280 r8:8027f5e8 r7:eb121e60 r6:85223300 r5:85382400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0f5fb0 to 0xeb0f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85215500 INFO: task kworker/0:310:4630 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 97383000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:443:4633 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:443 state:D stack:0 pid:4633 tgid:4633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb139d84 r8:00000002 r7:60000113 r6:eb139d8c r5:85380c00 r4:85380c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85380c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb139e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85228040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85380c00 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead47000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533538c r4:85335000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533538c r4:85229680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85380c00 r8:852296ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85229680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85229680 r8:8027f5e8 r7:eb0e9e60 r6:85223380 r5:85380c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb139fb0 to 0xeb139ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85228e00 INFO: task kworker/1:443:4633 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 97b70000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:311:4635 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:311 state:D stack:0 pid:4635 tgid:4635 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb13dd84 r8:00000002 r7:60000113 r6:eb13dd8c r5:85384800 r4:85384800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85384800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb13de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85215b00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85384800 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac87000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a2b8c r4:853a2800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a2b8c r4:85223400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85384800 r8:8522342c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85223400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85223400 r8:8027f5e8 r7:eb121e60 r6:85223480 r5:85384800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb13dfb0 to 0xeb13dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85215980 INFO: task kworker/0:311:4635 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 983cf000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:312:4638 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:312 state:D stack:0 pid:4638 tgid:4638 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb141d84 r8:00000002 r7:60000013 r6:eb141d8c r5:85383c00 r4:85383c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85383c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb141e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85215f40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85383c00 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacf9000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a338c r4:853a3000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a338c r4:85223500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85383c00 r8:8522352c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85223500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85223500 r8:8027f5e8 r7:eb121e60 r6:85223580 r5:85383c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb141fb0 to 0xeb141ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85215940 INFO: task kworker/0:312:4638 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 983cf000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 Exception stack(0xe47b9fb0 to 0xe47b9ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb145d84 r8:00000002 r7:60000013 r6:eb145d8c r5:85386000 r4:85386000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85386000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb145e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522b700 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85386000 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae3f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853ac38c r4:853ac000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853ac38c r4:85223600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85386000 r8:8522362c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85223600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85223600 r8:8027f5e8 r7:eb141e60 r6:85223680 r5:85386000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb145fb0 to 0xeb145ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85215dc0 INFO: task kworker/0:313:4640 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 985d0000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:314:4641 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:314 state:D stack:0 pid:4641 tgid:4641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb149d84 r8:00000002 r7:60000013 r6:eb149d8c r5:85386c00 r4:85386c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85386c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb149e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851efa80 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85386c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead29000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a378c r4:853a3400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a378c r4:85223700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85386c00 r8:8522372c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85223700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85223700 r8:8027f5e8 r7:eb145e60 r6:85223780 r5:85386c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb149fb0 to 0xeb149ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851efec0 INFO: task kworker/0:314:4641 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 985d0000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:444:4644 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:444 state:D stack:0 pid:4644 tgid:4644 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb159d84 r8:00000002 r7:60000013 r6:eb159d8c r5:85381800 r4:85381800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85381800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb159e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8517c880 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85381800 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0517000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533738c r4:85337000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533738c r4:85229700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85381800 r8:8522972c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85229700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85229700 r8:8027f5e8 r7:eb139e60 r6:85223800 r5:85381800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb159fb0 to 0xeb159ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85228e80 INFO: task kworker/1:444:4644 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 99071000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:445:4645 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:445 state:D stack:0 pid:4645 tgid:4645 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb15dd84 r8:00000002 r7:60000113 r6:eb15dd8c r5:85383000 r4:85383000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85383000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb15de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ea9c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85383000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb24b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533578c r4:85335400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533578c r4:85229780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85383000 r8:852297ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85229780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85229780 r8:8027f5e8 r7:eb159e60 r6:85223880 r5:85383000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb15dfb0 to 0xeb15dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85228e80 INFO: task kworker/1:445:4645 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 99071000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:315:4647 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:315 state:D stack:0 pid:4647 tgid:4647 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb161d84 r8:00000002 r7:60000113 r6:eb161d8c r5:85385400 r4:85385400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85385400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb161e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522b2c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85385400 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead61000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a3b8c r4:853a3800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a3b8c r4:85223900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85385400 r8:8522392c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85223900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85223900 r8:8027f5e8 r7:eb145e60 r6:85223980 r5:85385400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb161fb0 to 0xeb161ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8522b140 INFO: task kworker/0:315:4647 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 99071000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:316:4648 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:316 state:D stack:0 pid:4648 tgid:4648 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb165d84 r8:00000002 r7:60000113 r6:eb165d8c r5:84c8c800 r4:84c8c800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c8c800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb165e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522b640 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84c8c800 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae07000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a3f8c r4:853a3c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a3f8c r4:85223a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c8c800 r8:85223a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85223a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85223a00 r8:8027f5e8 r7:eb145e60 r6:85223a80 r5:84c8c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb165fb0 to 0xeb165ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8522b140 INFO: task kworker/0:316:4648 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 996a1000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:317:4651 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:317 state:D stack:0 pid:4651 tgid:4651 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb155d84 r8:00000002 r7:60000013 r6:eb155d8c r5:84c8ec00 r4:84c8ec00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c8ec00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb155e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522b840 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84c8ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae7b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853ac78c r4:853ac400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853ac78c r4:85223b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c8ec00 r8:85223b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85223b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85223b00 r8:8027f5e8 r7:eb145e60 r6:85223b80 r5:84c8ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb155fb0 to 0xeb155ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8522b580 INFO: task kworker/0:317:4651 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) Exception stack(0xe47b9d28 to 0xe47b9d70) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:318:4653 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:318 state:D stack:0 pid:4653 tgid:4653 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb169d84 r8:00000002 r7:60000013 r6:eb169d8c r5:85388000 r4:85388000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:00001000 r4:eb015000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85223c00 r8:8027f5e8 r7:eb155e60 r6:85223c80 r5:85388000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb169fb0 to 0xeb169ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe47b9d28 to 0xe47b9d70) r4:e47b9dc0 r5:85a7af8c r4:85a7ac00 r4:00000001 [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eaeb5000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:853acb8c r4:85223d00 r10:00000000 r9:85223d00 r8:8027f5e8 r7:eb169e60 r6:85223d80 r5:85388c00 task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11a4 r4:00000000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 INFO: task kworker/0:320:4657 blocked for more than 459 seconds. r4:85389800 r4:00000000 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522bf80 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85389800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb17f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853ad78c r4:853ad400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853ad78c r4:85223e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85389800 r8:85223e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85223e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85223e00 r8:8027f5e8 r7:eb169e60 r6:85223e80 r5:85389800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb16dfb0 to 0xeb16dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8522ba40 INFO: task kworker/0:320:4657 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 99f08000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 r4:84e5a340 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb151000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 9a14f000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:322:4661 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:322 state:D stack:0 pid:4661 tgid:4661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb189d84 r8:00000002 r7:60000113 r6:eb189d8c r5:8538c800 r4:8538c800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8538c800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:8538c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 r5:00001000 r4:eb18b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8538c800 r8:8521402c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:82ac11a4 r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 r4:8454d780 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eb1af000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:853ae78c r4:85214100 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 9a14f000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:324:4665 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:324 state:D stack:0 pid:4665 tgid:4665 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:8538d400 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb197000 r7:dddced80 r6:83018000 r5:853adf8c r4:85214200 Exception stack(0xeb195fb0 to 0xeb195ff8) r4:8522c240 Call trace: Exception stack(0xe47b9d28 to 0xe47b9d70) r4:82ac11a4 r4:00000000 r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:325:4668 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:325 state:D stack:0 pid:4668 tgid:4668 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb1a1d84 r8:00000002 r7:60000113 r6:eb1a1d8c r5:8538e000 r4:8538e000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8538e000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1a1e08 r5:00001000 r4:eb1a3000 r7:dddced80 r6:83018000 r5:853ae38c r4:85214300 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r5:80070013 r4:80239bb0 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eb1cb000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85214400 r10:00000000 r9:85214400 r8:8027f5e8 r7:eb175e60 r6:85214480 r5:8538ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1adfb0 to 0xeb1adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8522c4c0 INFO: task kworker/0:326:4669 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 9add7000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:327:4671 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:327 state:D stack:0 pid:4671 tgid:4671 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb1c9d84 r8:00000002 r7:60000113 r6:eb1c9d8c r5:8530ec00 r4:8530ec00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8530ec00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1c9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522c800 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8530ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1bb000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853aeb8c r4:853ae800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853aeb8c r4:85214500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eb1d7000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853af38c r4:853af000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853af38c r4:85214580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85306c00 r8:852145ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85214580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85214580 r8:8027f5e8 r7:eb1ade60 r6:85229880 r5:85306c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1e5fb0 to 0xeb1e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8522c7c0 INFO: task kworker/0:328:4674 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 9b274000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r4:e47b9dc0 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) INFO: task kworker/0:329:4676 blocked for more than 460 seconds. r4:00000000 r5:00001000 r4:eb203000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe47b9d28 to 0xe47b9d70) r4:82ac11a4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:330:4677 blocked for more than 460 seconds. r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522cbc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8538bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1e7000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853af78c r4:853af400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853af78c r4:85214700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8538bc00 r8:8521472c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85214700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85214700 r8:8027f5e8 r7:eb201e60 r6:85214780 r5:8538bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1b9fb0 to 0xeb1b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8522cc80 INFO: task kworker/0:330:4677 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 9b6b8000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r4:84e5a340 task:kworker/0:331 state:D stack:0 pid:4679 tgid:4679 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1e1e08 r5:00001000 r4:eb20f000 r10:61c88647 r9:84ea8000 r8:8521482c r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 9b6b8000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:332 state:D stack:0 pid:4682 tgid:4682 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1f1e08 r5:00001000 r4:eb21b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b438c r4:853b4000 r7:dddced80 r6:83018000 r5:853b438c r4:85214900 r10:00000000 r9:85214900 r8:8027f5e8 r7:eb1e1e60 r6:85214980 r5:84ea8c00 task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80070013 r4:80239bb0 r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:333:4683 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:333 state:D stack:0 pid:4683 tgid:4683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb1c5d84 r8:00000002 r7:60000013 r6:eb1c5d8c r5:84eaa400 r4:84eaa400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84eaa400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1c5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:eb227000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85214a00 r8:8027f5e8 r7:eb1f1e60 r6:85214a80 r5:84eaa400 task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:334:4685 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:334 state:D stack:0 pid:4685 tgid:4685 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb225d84 r8:00000002 r7:60000113 r6:eb225d8c r5:84eab000 r4:84eab000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84eab000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb225e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851bd880 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84eab000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb27b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b578c r4:853b5400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b578c r4:85214b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84eab000 r8:85214b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85214b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85214b00 r8:8027f5e8 r7:eb1c5e60 r6:85214b80 r5:84eab000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb225fb0 to 0xeb225ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8522bec0 INFO: task kworker/0:334:4685 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 9c0b3000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:335:4686 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:335 state:D stack:0 pid:4686 tgid:4686 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb249d84 r8:00000002 r7:60000013 r6:eb249d8c r5:84eabc00 r4:84eabc00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84eabc00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb249e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851bd440 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84eabc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb25b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b4b8c r4:853b4800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b4b8c r4:85214c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84eabc00 r8:85214c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85214c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85214c00 r8:8027f5e8 r7:eb225e60 r6:85214c80 r5:84eabc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb249fb0 to 0xeb249ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851efec0 INFO: task kworker/0:335:4686 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 9c1b7000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:446:4687 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:446 state:D stack:0 pid:4687 tgid:4687 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb259d84 r8:00000002 r7:60000013 r6:eb259d8c r5:84ead400 r4:84ead400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ead400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb259e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ea2c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ead400 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9e9000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85335b8c r4:85335800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85335b8c r4:85229900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ead400 r8:8522992c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85229900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85229900 r8:8027f5e8 r7:eb159e60 r6:85214d00 r5:84ead400 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:82ac11a4 r4:00000000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/0:336 state:D stack:0 pid:4691 tgid:4691 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb263000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b4f8c r4:853b4c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b4f8c r4:85214d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84eae000 r8:85214dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85214d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85214d80 r8:8027f5e8 r7:eb225e60 r6:85214e00 r5:84eae000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb26dfb0 to 0xeb26dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851bd340 INFO: task kworker/0:336:4691 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 9c4c7000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:337:4692 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r10:8291880c r9:eb20dd84 r8:00000002 r7:60000013 r6:eb20dd8c r5:85310c00 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb26f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b538c r4:853b5000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b538c r4:85214e80 r10:61c88647 r9:85310c00 r8:85214eac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeb20dfb0 to 0xeb20dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851bd5c0 INFO: task kworker/0:337:4692 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 9cd73000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:338:4695 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:338 state:D stack:0 pid:4695 tgid:4695 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb289d84 r8:00000002 r7:60000113 r6:eb289d8c r5:85313000 r4:85313000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85313000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb289e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851bd9c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85313000 r7:00000000 r6:83018000 r5:00001000 r4:7f0cb000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb28b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b5b8c r4:853b5800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b5b8c r4:85214f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85313000 r8:85214f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85214f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85214f00 r8:8027f5e8 r7:eb225e60 r6:85229a00 r5:85313000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb289fb0 to 0xeb289ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851bd680 INFO: task kworker/0:338:4695 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 9cd73000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:8454d780 Exception stack(0xe47b9fb0 to 0xe47b9ff8) Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:ea901000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85312400 r8:851cb02c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851bd840 INFO: task kworker/0:339:4697 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 9cf5a000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2a5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851bda40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85313c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0cd000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb297000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b5f8c r4:853b5c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b5f8c r4:851cb080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85313c00 r8:851cb0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851cb080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851cb080 r8:8027f5e8 r7:eb2a1e60 r6:85229b00 r5:85313c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2a5fb0 to 0xeb2a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851bd840 INFO: task kworker/0:340:4698 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 9d2df000 e8845000 00000001 80239b98 7f1c9000 00000001 r4:82ac11a4 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:84e5a340 Workqueue: events bpf_prog_free_deferred r5:85311800 r4:82918808 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb2ab000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xeb2b5fb0 to 0xeb2b5ff8) Workqueue: events bpf_prog_free_deferred r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 9d671000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:342:4702 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:342 state:D stack:0 pid:4702 tgid:4702 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb2c5d84 r8:00000002 r7:60000113 r6:eb2c5d8c r5:85314800 r4:85314800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85314800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2c5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851bdd40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85314800 r7:00000000 r6:83018000 r5:00001000 r4:7f0d1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2bb000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b678c r4:853b6400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b678c r4:851cb180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85314800 r8:851cb1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851cb180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851cb180 r8:8027f5e8 r7:eb2a1e60 r6:85229c00 r5:85314800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2c5fb0 to 0xeb2c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851bdc80 INFO: task kworker/0:342:4702 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:447 state:D stack:0 pid:4706 tgid:4706 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r9:83018205 r8:85316000 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 r5:00001000 r4:dfa4b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85335f8c r4:85229c80 Exception stack(0xeb2c9fb0 to 0xeb2c9ff8) INFO: task kworker/1:447:4706 is blocked on a mutex likely owned by task kworker/1:171:3869. Exception stack(0xe47b9d28 to 0xe47b9d70) r4:82ac11a4 r4:e47b9dc0 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:8454d780 Exception stack(0xe47b9fb0 to 0xe47b9ff8) Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb255e08 r5:00001000 r4:dfcdb000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533638c r4:85336000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533638c r4:85229d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85315400 r8:85229dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85229d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85229d80 r8:8027f5e8 r7:eb159e60 r6:85229e00 r5:85315400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb255fb0 to 0xeb255ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84769940 INFO: task kworker/1:448:4709 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 9dd66000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb279e08 r5:00001000 r4:dfd5d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8533678c r4:85336400 r4:85229e80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe47b9d28 to 0xe47b9d70) r4:82ac11a4 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0c1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85228400 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8530bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b6f8c r4:853b6c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b6f8c r4:851cb200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8530bc00 r8:851cb22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:851cb200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851cb200 r8:8027f5e8 r7:eb2a1e60 r6:85229f80 r5:8530bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0c1fb0 to 0xeb0c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851bdf00 INFO: task kworker/0:343:4712 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 9e5e7000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:84e5a340 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85300c00 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 r5:00001000 r4:dff17000 r7:ddde2d80 r6:83018200 r5:85336b8c r4:8517f000 Exception stack(0xeb0a1fb0 to 0xeb0a1ff8) task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11a4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2d9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8517c1c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85318c00 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e009b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85336f8c r4:85336c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85336f8c r4:8517f100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85318c00 r8:8517f12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8517f100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8517f100 r8:8027f5e8 r7:eb159e60 r6:8517f180 r5:85318c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2d9fb0 to 0xeb2d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8517c600 INFO: task kworker/1:451:4716 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 9ead0000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:452:4720 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:452 state:D stack:0 pid:4720 tgid:4720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb2ddd84 r8:00000002 r7:60000013 r6:eb2ddd8c r5:85318000 r4:85318000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85318000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2dde08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8517ca00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85318000 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0587000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533778c r4:85337400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533778c r4:8517f200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85318000 r8:8517f22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe47b9d28 to 0xe47b9d70) r4:82ac11a4 r4:00000000 r5:85a7af8c r4:85a7ac00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:344:4721 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:344 state:D stack:0 pid:4721 tgid:4721 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb2e1d84 r8:00000002 r7:60000113 r6:eb2e1d8c r5:85319800 r4:85319800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85319800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2e1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b80c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85319800 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05e1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b738c r4:853b7000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b738c r4:851cb280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85319800 r8:851cb2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851cb280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851cb280 r8:8027f5e8 r7:eb2a1e60 r6:8517f300 r5:85319800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2e1fb0 to 0xeb2e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851bde00 INFO: task kworker/0:344:4721 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82ac11a4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:453 state:D stack:0 pid:4722 tgid:4722 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:e0775000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8517f380 r8:8027f5e8 r7:eb2dde60 r6:8517f400 r5:8531b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2e5fb0 to 0xeb2e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8517ca40 INFO: task kworker/1:453:4722 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 9f157000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:454:4725 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:454 state:D stack:0 pid:4725 tgid:4725 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:8531bc00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2ede08 r5:00001000 r4:e47d9000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8531bc00 r8:8517f4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:82ac11a4 r4:00000000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:345:4726 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:345 state:D stack:0 pid:4726 tgid:4726 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb2f1d84 r8:00000002 r7:60000113 r6:eb2f1d8c r5:8531c800 r4:8531c800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8531c800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2f1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d6400 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8531c800 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf19000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8534ef8c r4:8534ec00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8534ef8c r4:851cb300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8531c800 r8:851cb32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:851cb300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851cb300 r8:8027f5e8 r7:eb2a1e60 r6:8517f580 r5:8531c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2f1fb0 to 0xeb2f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851b8000 INFO: task kworker/0:345:4726 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 9f5af000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:455 state:D stack:0 pid:4727 tgid:4727 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 r5:00001000 r4:ea97d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8534c38c r4:8517f600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e8811000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8443138c r4:84431000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8443138c r4:8517f700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8531e000 r8:8517f72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8517f700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8517f700 r8:8027f5e8 r7:eb2f5e60 r6:8517f780 r5:8531e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2e9fb0 to 0xeb2e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8517cf40 INFO: task kworker/1:456:4729 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 9f9fd000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r4:85316c00 [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ea9f7000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85316c00 r8:8517f82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:8454d780 Exception stack(0xe47b9fb0 to 0xe47b9ff8) INFO: task kworker/1:458:4734 blocked for more than 460 seconds. r4:8531ec00 [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eaa29000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8534cb8c r4:8517f900 r10:00000000 r9:8517f900 r8:8027f5e8 r7:eb2f9e60 r6:8517f980 r5:8531ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb085fb0 to 0xeb085ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850fd380 INFO: task kworker/1:458:4734 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: 9fc7d000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:459:4737 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:459 state:D stack:0 pid:4737 tgid:4737 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb2d5d84 r8:00000002 r7:60000013 r6:eb2d5d8c r5:8531a400 r4:8531a400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8531a400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2d5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fd780 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8531a400 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa63000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8534cf8c r4:8534cc00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8534cf8c r4:8517fa00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8531a400 r8:8517fa2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8517fa00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8517fa00 r8:8027f5e8 r7:eb085e60 r6:8517fa80 r5:8531a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:82ac11a4 r4:00000000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853d0000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2fde08 r5:00001000 r4:eaa8d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8534d38c r4:8517fb00 Exception stack(0xeb2fdfb0 to 0xeb2fdff8) INFO: task kworker/1:460:4738 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: a00d3000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:461:4741 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:461 state:D stack:0 pid:4741 tgid:4741 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb301d84 r8:00000002 r7:60000013 r6:eb301d8c r5:853d0c00 r4:853d0c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853d0c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb301e08 r5:00001000 r4:eaac1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:8534d78c r4:8517fc00 Exception stack(0xeb301fb0 to 0xeb301ff8) task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11a4 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eab69000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:853d1800 r8:8517feac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850fd880 INFO: task kworker/1:462:4742 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: a0654000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:463:4745 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:463 state:D stack:0 pid:4745 tgid:4745 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb305d84 r8:00000002 r7:60000013 r6:eb305d8c r5:853d3000 r4:853d3000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853d3000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb305e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r4:00000000 r5:00001000 r4:eab2d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8534db8c r4:8534d800 r10:61c88647 r9:853d3000 r8:8517ffac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe47b9d28 to 0xe47b9d70) r4:82ac11a4 r4:00000000 r5:85a7af8c r4:85a7ac00 r4:8454d780 r4:00000001 r4:84e5a340 task:kworker/1:464 state:D stack:0 pid:4746 tgid:4746 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 r5:00001000 r4:eabb1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8534e38c r4:8517fd80 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: a1589000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:465:4748 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:465 state:D stack:0 pid:4748 tgid:4748 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb315d84 r8:00000002 r7:60000013 r6:eb315d8c r5:853d5400 r4:853d5400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853d5400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb315e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d6180 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaebf000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8534e78c r4:8534e400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8534e78c r4:851e9000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853d5400 r8:851e902c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851e9000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e9000 r8:8027f5e8 r7:eb311e60 r6:851e9080 r5:853d5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb315fb0 to 0xeb315ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850fde40 INFO: task kworker/1:465:4748 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: a19fa000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:466:4750 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:466 state:D stack:0 pid:4750 tgid:4750 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb30dd84 r8:00000002 r7:60000113 r6:eb30dd8c r5:853d2400 r4:853d2400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853d2400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb30de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d67c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853d2400 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb05b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8534f78c r4:8534f400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8534f78c r4:851e9100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853d2400 r8:851e912c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851e9100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e9100 r8:8027f5e8 r7:eb315e60 r6:851e9180 r5:853d2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb30dfb0 to 0xeb30dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851d6200 INFO: task kworker/1:466:4750 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 Exception stack(0xe47b9fb0 to 0xe47b9ff8) INFO: task kworker/1:467:4752 blocked for more than 461 seconds. Workqueue: events bpf_prog_free_deferred r4:853d6000 [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d62c0 r5:00001000 r4:eaee1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8534eb8c r4:8534e800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8534eb8c r4:851e9200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853d6000 r8:851e922c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851e9200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e9200 r8:8027f5e8 r7:eb30de60 r6:851e9280 r5:853d6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb319fb0 to 0xeb319ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851d6340 INFO: task kworker/1:467:4752 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: a19fa000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:468:4754 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:468 state:D stack:0 pid:4754 tgid:4754 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb321d84 r8:00000002 r7:60000013 r6:eb321d8c r5:853d6c00 r4:853d6c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853d6c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb321e08 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafe1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8534f38c r4:851e9300 r10:61c88647 r9:853d6c00 r8:851e932c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851e9300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e9300 r8:8027f5e8 r7:eb30de60 r6:851e9380 r5:853d6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb321fb0 to 0xeb321ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851d6340 INFO: task kworker/1:468:4754 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: a19fa000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:346:4755 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:346 state:D stack:0 pid:4755 tgid:4755 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb325d84 r8:00000002 r7:60000113 r6:eb325d8c r5:84eac800 r4:84eac800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb1a5000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:82ac11a4 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e5a340 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb08f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8534fb8c r4:851e9400 Exception stack(0xeb331fb0 to 0xeb331ff8) Workqueue: events bpf_prog_free_deferred Exception stack(0xe47b9d28 to 0xe47b9d70) r4:e47b9dc0 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:470:4760 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:470 state:D stack:0 pid:4760 tgid:4760 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb341d84 r8:00000002 r7:60000113 r6:eb341d8c r5:84e48c00 r4:84e48c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e48c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb341e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d6c00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84e48c00 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0b7000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8535438c r4:85354000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8535438c r4:851e9480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e48c00 r8:851e94ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851e9480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e9480 r8:8027f5e8 r7:eb331e60 r6:851cb500 r5:84e48c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb341fb0 to 0xeb341ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851d6780 INFO: task kworker/1:470:4760 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: a2391000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r4:853d4800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb31de08 r5:00001000 r4:eb0a3000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8534ff8c r4:8534fc00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8534ff8c r4:851e9500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853d4800 r8:851e952c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851e9500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e9500 r8:8027f5e8 r7:eb341e60 r6:851e9580 r5:853d4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb31dfb0 to 0xeb31dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851d6780 INFO: task kworker/1:471:4761 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 Not tainted 6.15.0-syzkaller #0 r10:8291880c r9:eb345d84 r8:00000002 r7:60000113 r6:eb345d8c r5:853d8000 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb0cb000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8535478c r4:85354400 r4:851e9600 Exception stack(0xeb345fb0 to 0xeb345ff8) task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11a4 r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 r4:8454d780 Exception stack(0xe47b9fb0 to 0xe47b9ff8) Not tainted 6.15.0-syzkaller #0 r4:853d8c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb349e08 r5:00001000 r4:eb0fb000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:8535538c r4:851e9700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853d8c00 r8:851e972c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851e9700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e9700 r8:8027f5e8 r7:eb345e60 r6:851e9780 r5:853d8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb349fb0 to 0xeb349ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851d6bc0 INFO: task kworker/1:473:4766 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: a2f9c000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:474:4768 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:474 state:D stack:0 pid:4768 tgid:4768 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb329d84 r8:00000002 r7:60000113 r6:eb329d8c r5:853da400 r4:853da400 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0df000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85354b8c r4:851e9800 Exception stack(0xeb329fb0 to 0xeb329ff8) INFO: task kworker/1:474:4768 is blocked on a mutex likely owned by task kworker/1:171:3869. 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb0ed000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85354f8c r4:851e9900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853dbc00 r8:851e992c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851e9900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e9900 r8:8027f5e8 r7:eb349e60 r6:851e9980 r5:853dbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb351fb0 to 0xeb351ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851d6f40 INFO: task kworker/1:475:4770 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: a32fa000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:476:4772 blocked for more than 461 seconds. Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb359e08 r5:00001000 r4:eb355000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:82ac11a4 r4:00000000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r4:84e5a340 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r4:8521e340 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:478:4776 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:478 state:D stack:0 pid:4776 tgid:4776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb185d84 r8:00000002 r7:60000113 r6:eb185d8c r5:84e4bc00 r4:84e4bc00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e4bc00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb185e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8521e780 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84e4bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb09000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85355f8c r4:85355c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8521e6c0 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 9d60: 80230ad4 80239bb0 80070013 ffffffff r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 r4:8454d780 Exception stack(0xe47b9fb0 to 0xe47b9ff8) Not tainted 6.15.0-syzkaller #0 r4:84e4a400 r4:00000000 r4:00000000 r5:00001000 r4:dfea3000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84e4a400 r8:851e9c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 9d60: 80230ad4 80239bb0 80070013 ffffffff [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:480:4779 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:480 state:D stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb19dd84 r8:00000002 r7:60000113 r6:eb19dd8c r5:84e4c800 r4:84e4c800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e4c800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb19de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8521e900 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84e4c800 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdfd000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8535638c r4:85356000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8535638c r4:851e9c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e4c800 r8:851e9cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851e9c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e9c80 r8:8027f5e8 r7:eb191e60 r6:851cb700 r5:84e4c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb19dfb0 to 0xeb19dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8521e3c0 INFO: task kworker/1:480:4779 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: a4261000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:ece91000 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:853db000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 r5:00001000 r4:e0713000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8521e800 INFO: task kworker/1:481:4782 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: a45e1000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:482:4783 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:482 state:D stack:0 pid:4783 tgid:4783 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb365d84 r8:00000002 r7:60000013 r6:eb365d8c r5:853de000 r4:853de000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853de000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb365e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018205 r8:853de000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 r5:00001000 r4:e069b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85356b8c r4:851e9e00 Exception stack(0xeb365fb0 to 0xeb365ff8) task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r4:84e5a340 task:kworker/1:483 state:D stack:0 pid:4786 tgid:4786 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ea8cf000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xeb1a9fb0 to 0xeb1a9ff8) task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: a4d2a000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84e5a340 task:kworker/1:484 state:D stack:0 pid:4788 tgid:4788 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:ea93d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8535778c r4:8522d000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe47b9d28 to 0xe47b9d70) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:485:4790 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:485 state:D stack:0 pid:4790 tgid:4790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb1d1d84 r8:00000002 r7:60000113 r6:eb1d1d8c r5:853d9800 r4:853d9800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853d9800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1d1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85231040 r5:00001000 r4:eabcb000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: a4f71000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84e5a340 Workqueue: events bpf_prog_free_deferred [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac21000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85357f8c r4:8522d200 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xe47b9fb0 to 0xe47b9ff8) Not tainted 6.15.0-syzkaller #0 r4:853e0c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1ede08 r5:00001000 r4:eac9f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:82ac11a4 r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e5a340 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb209e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85231440 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853e1800 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac65000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8544438c r4:85444000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8544438c r4:8522d400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e1800 r8:8522d42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8522d400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8522d400 r8:8027f5e8 r7:eb1ede60 r6:8522d480 r5:853e1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb209fb0 to 0xeb209ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852312c0 INFO: task kworker/1:488:4796 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: a5746000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r4:84e5a340 task:kworker/1:489 state:D stack:0 pid:4798 tgid:4798 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ead7f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8544578c r4:8522d500 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8454d780 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eacef000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85444b8c r4:8522d600 r4:00000001 r4:85231680 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:491:4801 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:491 state:D stack:0 pid:4801 tgid:4801 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb1b5d84 r8:00000002 r7:60000113 r6:eb1b5d8c r5:853e3c00 r4:853e3c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853e3c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1b5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85231900 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead31000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85444f8c r4:85444c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85444f8c r4:8522d700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e3c00 r8:8522d72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8522d700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8522d700 r8:8027f5e8 r7:eb215e60 r6:8522d780 r5:853e3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1b5fb0 to 0xeb1b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85231840 INFO: task kworker/1:491:4801 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb251e08 r5:00001000 r4:ead53000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8544538c r4:8522d800 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:493:4805 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:493 state:D stack:0 pid:4805 tgid:4805 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb269d84 r8:00000002 r7:60000013 r6:eb269d8c r5:853e5400 r4:853e5400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853e5400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb269e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85231d80 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853e5400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae41000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85445b8c r4:85445800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85445b8c r4:8522d900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e5400 r8:8522d92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8522d900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8522d900 r8:8027f5e8 r7:eb215e60 r6:8522d980 r5:853e5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb269fb0 to 0xeb269ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11a4 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:494 state:D stack:0 pid:4808 tgid:4808 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eae99000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:853e6000 r8:8522da2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe47b9d28 to 0xe47b9d70) 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:495:4811 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:495 state:D stack:0 pid:4811 tgid:4811 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb291d84 r8:00000002 r7:60000013 r6:eb291d8c r5:853e6c00 r4:853e6c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853e6c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r4:00000000 r5:00001000 r4:eb007000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8544638c r4:85446000 r10:61c88647 r9:853e6c00 r8:8522db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:82ac11a4 r4:00000000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 INFO: task kworker/1:496:4812 blocked for more than 461 seconds. r10:8291880c r9:eb275d84 r8:00000002 r7:60000113 r6:eb275d8c r5:853e8000 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb103000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:82ac11a4 r4:00000000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:8291880c r9:eb2a9d84 r8:00000002 r7:60000013 r6:eb2a9d8c r5:853e9800 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb14b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85446b8c r4:85446800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85446b8c r4:8522dd00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e9800 r8:8522dd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8522dd00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8522dd00 r8:8027f5e8 r7:eb275e60 r6:8522dd80 r5:853e9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2a9fb0 to 0xeb2a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852c2080 INFO: task kworker/1:497:4813 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: a6843000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:498:4817 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:498 state:D stack:0 pid:4817 tgid:4817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb2c1d84 r8:00000002 r7:60000013 r6:eb2c1d8c r5:853eb000 r4:853eb000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853eb000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2c1e08 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb17d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb2c1fb0 to 0xeb2c1ff8) r4:852c2380 Workqueue: events bpf_prog_free_deferred 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 r4:00000000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e4ec00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb29de08 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb293000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85447f8c r4:85447c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85447f8c r4:8522df00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e4ec00 r8:8522df2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8522df00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8522df00 r8:8027f5e8 r7:eb2c1e60 r6:851cb780 r5:84e4ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb29dfb0 to 0xeb29dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852c2540 INFO: task kworker/1:499:4818 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: a6db8000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:347:4821 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:347 state:D stack:0 pid:4821 tgid:4821 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb2b1d84 r8:00000002 r7:60000113 r6:eb2b1d8c r5:84e4e000 r4:84e4e000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e4e000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2b1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852bd880 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84e4e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1d3000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b7f8c r4:853b7c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b7f8c r4:851cb800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e4e000 r8:851cb82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:851cb800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851cb800 r8:8027f5e8 r7:eb2a1e60 r6:851cb880 r5:84e4e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2b1fb0 to 0xeb2b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852bd7c0 INFO: task kworker/0:347:4821 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 9d60: 80230ad4 80239bb0 80070013 ffffffff r4:00000000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb205000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84e4d400 r8:8522dfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8522df80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8522df80 r8:8027f5e8 r7:eb29de60 r6:851cb900 r5:84e4d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2d1fb0 to 0xeb2d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852c2800 INFO: task kworker/1:500:4823 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: a714d000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe47b9fb0 to 0xe47b9ff8) Not tainted 6.15.0-syzkaller #0 r4:84e49800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb36de08 r5:00001000 r4:eb21d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8454bb8c r4:8454b800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8454bb8c r4:851cb980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e49800 r8:851cb9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851cb980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851cb980 r8:8027f5e8 r7:eb2a1e60 r6:851cba00 r5:84e49800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb36dfb0 to 0xeb36dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852bd7c0 INFO: task kworker/0:348:4825 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 9d60: 80230ad4 80239bb0 80070013 ffffffff r4:00000000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r4:84e5a340 task:kworker/1:501 state:D stack:0 pid:4826 tgid:4826 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb24d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:501:4826 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: a7517000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:349 state:D stack:0 pid:4828 tgid:4828 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84ea9800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb369e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852caa40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ea9800 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc71000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c878c r4:853c8400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853c878c r4:851cbb00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ea9800 r8:851cbb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:851cbb00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851cbb00 r8:8027f5e8 r7:eb2a1e60 r6:851cbb80 r5:84ea9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb369fb0 to 0xeb369ff8) 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:349:4828 is blocked on a mutex likely owned by task kworker/1:171:3869. 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:502:4831 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:502 state:D stack:0 pid:4831 tgid:4831 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb37dd84 r8:00000002 r7:60000113 r6:eb37dd8c r5:84cf8c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb37de08 r5:00001000 r4:eb265000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84cf8c00 r8:852bf0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 INFO: task kworker/1:502:4831 is blocked on a mutex likely owned by task kworker/1:171:3869. 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84cf8000 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb3be000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:852bf100 r8:8027f5e8 r7:eb29de60 r6:851cbc80 r5:84cf8000 INFO: task kworker/1:503:4834 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: a7831000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:504:4836 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:504 state:D stack:0 pid:4836 tgid:4836 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb399d84 r8:00000002 r7:60000113 r6:eb399d8c r5:84cf9800 r4:84cf9800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cf9800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb399e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb2bd000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:852bf180 r8:8027f5e8 r7:eb395e60 r6:851cbd00 r5:84cf9800 task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11a4 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84cfb000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb39de08 r5:00001000 r4:eb385000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8545078c r4:85450400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8545078c r4:852bf200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84cfb000 r8:852bf22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852bf200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852bf200 r8:8027f5e8 r7:eb395e60 r6:851cbd80 r5:84cfb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb39dfb0 to 0xeb39dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852c2ec0 INFO: task kworker/1:505:4837 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: a7eb6000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3a1e08 r5:00001000 r4:eb391000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85450b8c r4:852bf280 Exception stack(0xeb3a1fb0 to 0xeb3a1ff8) task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:507:4840 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:507 state:D stack:0 pid:4840 tgid:4840 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb3c5d84 r8:00000002 r7:60000013 r6:eb3c5d8c r5:84cfd400 r4:84cfd400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cfd400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3c5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c5ac0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84cfd400 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000 r5:00001000 r4:eb415000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3cd000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:82ac11a4 r4:00000000 r5:85a7af8c r4:85a7ac00 r4:8454d780 Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:509:4844 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:509 state:D stack:0 pid:4844 tgid:4844 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb3e5d84 r8:00000002 r7:60000113 r6:eb3e5d8c r5:84cfe000 r4:84cfe000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cfe000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3e5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c5540 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84cfe000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3d9000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85451b8c r4:85451800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85451b8c r4:852bf480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84cfe000 r8:852bf4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852bf480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852bf480 r8:8027f5e8 r7:eb3c5e60 r6:851cbf80 r5:84cfe000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3e5fb0 to 0xeb3e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852c5200 INFO: task kworker/1:509:4844 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: a8e17000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:510:4846 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:510 state:D stack:0 pid:4846 tgid:4846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:84cfec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000 r5:00001000 r4:eb3ed000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:82ac11a4 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:511:4848 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:511 state:D stack:0 pid:4848 tgid:4848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb381d84 r8:00000002 r7:60000113 r6:eb381d8c r5:853ebc00 r4:853ebc00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853ebc00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb381e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c57c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853ebc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3f9000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8545238c r4:85452000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8545238c r4:852bf580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853ebc00 r8:852bf5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852bf580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852bf580 r8:8027f5e8 r7:eb3c5e60 r6:852bf600 r5:853ebc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb381fb0 to 0xeb381ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852c5440 INFO: task kworker/1:511:4848 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:512 state:D stack:0 pid:4850 tgid:4850 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:eb409000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r4:84e5a340 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:513 state:D stack:0 pid:4852 tgid:4852 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb40dd84 r8:00000002 r7:60000013 r6:eb40dd8c r5:853ed400 r4:853ed400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853ed400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb40de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c5d40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853ed400 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff6d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8545338c r4:85453000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8545338c r4:852bf780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853ed400 r8:852bf7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852bf780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852bf780 r8:8027f5e8 r7:eb3c5e60 r6:852bf800 r5:853ed400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb40dfb0 to 0xeb40dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852c5940 INFO: task kworker/1:513:4852 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: a9455000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853ee000 r4:00000000 r9:83018205 r8:853ee000 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 r5:00001000 r4:dfd4f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:853ee000 r8:852bf8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852c5940 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:82ac11a4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:515:4859 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:515 state:D stack:0 pid:4859 tgid:4859 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb42dd84 r8:00000002 r7:60000013 r6:eb42dd8c r5:853eec00 r4:853eec00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853eec00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb42de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:e0077000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:853eec00 r8:852bf9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:516:4861 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:853e8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 r5:00001000 r4:e03db000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 9d60: 80230ad4 80239bb0 80070013 ffffffff [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xe47b9fb0 to 0xe47b9ff8) Not tainted 6.15.0-syzkaller #0 r10:8291880c r9:eb435d84 r8:00000002 r7:60000113 r6:eb435d8c r5:85408000 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb4ff000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xeb435fb0 to 0xeb435ff8) INFO: task kworker/0:350:4862 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: a9bd9000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:517:4864 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb43de08 r5:00001000 r4:e0599000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85453f8c r4:852bfb80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d60: 80230ad4 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:518:4866 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:518 state:D stack:0 pid:4866 tgid:4866 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb445d84 r8:00000002 r7:60000113 r6:eb445d8c r5:85409800 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:ea9dd000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:852bfc00 r10:00000000 r9:852bfc00 r8:8027f5e8 r7:eb43de60 r6:852d9180 r5:85409800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb445fb0 to 0xeb445ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852bd2c0 INFO: task kworker/1:518:4866 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: a9bd9000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 r4:8454d780 Exception stack(0xe47b9fb0 to 0xe47b9ff8) Not tainted 6.15.0-syzkaller #0 r5:8540b000 r4:82918808 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:e061b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8545838c r4:85458000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8545838c r4:852bfc80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8540b000 r8:852bfcac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852bfc80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852bfc80 r8:8027f5e8 r7:eb445e60 r6:852d9200 r5:8540b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb449fb0 to 0xeb449ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852d70c0 INFO: task kworker/1:519:4867 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e47c5000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d7440 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8540bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e885d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85458b8c r4:85458800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85458b8c r4:852bfd80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8540bc00 r8:852bfdac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852bfd80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852bfd80 r8:8027f5e8 r7:eb445e60 r6:852d9300 r5:8540bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb459fb0 to 0xeb459ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852d7380 INFO: task kworker/1:521:4871 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: aa8c7000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:522 state:D stack:0 pid:4873 tgid:4873 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8540c800 r4:82918808 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb461e08 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:eaa15000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:852d7240 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: aa8c7000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:523:4877 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:523 state:D stack:0 pid:4877 tgid:4877 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb465d84 r8:00000002 r7:60000113 r6:eb465d8c r5:8540e000 r4:8540e000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8540e000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb465e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d7880 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eaa65000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8545978c r4:85459400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:852bfe80 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r5:00001000 r4:ece91000 r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:524:4878 blocked for more than 462 seconds. r4:8540ec00 [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaaa9000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85459b8c r4:85459800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85459b8c r4:852bff00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8540ec00 r8:852bff2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852bff00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852bff00 r8:8027f5e8 r7:eb465e60 r6:852d9480 r5:8540ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb469fb0 to 0xeb469ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852d7680 INFO: task kworker/1:524:4878 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: aadd6000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:525:4880 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:525 state:D stack:0 pid:4880 tgid:4880 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb46dd84 r8:00000002 r7:60000013 r6:eb46dd8c r5:8540d400 r4:8540d400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8540d400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb46de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d7b40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8540d400 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaafd000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85459f8c r4:852bff80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8540d400 r8:852bffac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852bff80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852bff80 r8:8027f5e8 r7:eb469e60 r6:852d9500 r5:8540d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb46dfb0 to 0xeb46dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852d74c0 INFO: task kworker/1:525:4880 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: ab236000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:526:4882 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:526 state:D stack:0 pid:4882 tgid:4882 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb471d84 r8:00000002 r7:60000013 r6:eb471d8c r5:84cfa400 r4:84cfa400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cfa400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb471e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d7c00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84cfa400 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab75000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8545a38c r4:8545a000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8545a38c r4:852e0000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84cfa400 r8:852e002c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852e0000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852e0000 r8:8027f5e8 r7:eb46de60 r6:852d9580 r5:84cfa400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb471fb0 to 0xeb471ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852d77c0 INFO: task kworker/1:526:4882 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: ab5c5000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84558000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d7d00 r5:00001000 r4:ead8b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8545a78c r4:852e0080 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 9d60: 80230ad4 80239bb0 80070013 ffffffff r4:e47b9dc0 r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:528:4886 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:528 state:D stack:0 pid:4886 tgid:4886 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb479d84 r8:00000002 r7:60000013 r6:eb479d8c r5:84558c00 r4:84558c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84558c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb479e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018205 r8:84558c00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaedf000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8545ab8c r4:8545a800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8545ab8c r4:852e0100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84558c00 r8:852e012c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852e0100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852e0100 r8:8027f5e8 r7:eb475e60 r6:852d9680 r5:84558c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb479fb0 to 0xeb479ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852d7b00 INFO: task kworker/1:528:4886 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) 9d20: ab84e000 e8845000 00000001 80239b98 7f1c9000 00000001 r4:e47b9dc0 r5:00001000 r4:ece91000 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf25000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r4:852d7ac0 Workqueue: events bpf_prog_free_deferred 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 r4:00000000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:84e5a340 Workqueue: events bpf_prog_free_deferred [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:00001000 r4:eb03f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8545b38c r4:8545b000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8545b38c r4:852e0200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8455a400 r8:852e022c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852e0200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852e0200 r8:8027f5e8 r7:eb47de60 r6:852d9780 r5:8455a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb481fb0 to 0xeb481ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852e3000 INFO: task kworker/1:530:4890 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: abc95000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:531:4892 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:531 state:D stack:0 pid:4892 tgid:4892 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb485d84 r8:00000002 r7:60000113 r6:eb485d8c r5:8455b000 r4:8455b000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8455b000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb485e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e3340 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8455b000 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb07d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8545b78c r4:8545b400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8545b78c r4:852e0280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8455b000 r8:852e02ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852e0280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852e0280 r8:8027f5e8 r7:eb481e60 r6:852d9800 r5:8455b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb485fb0 to 0xeb485ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852e3280 INFO: task kworker/1:531:4892 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: abc95000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 r4:00000001 r4:84e5a340 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:8455c800 r4:82918808 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:eb35b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8545d38c r4:8545d000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:533:4895 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:533 state:D stack:0 pid:4895 tgid:4895 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb491d84 r8:00000002 r7:60000013 r6:eb491d8c r5:8455d400 r4:8455d400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8455d400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb491e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e34c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8455d400 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0a5000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8545bb8c r4:8545b800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8545bb8c r4:852e0380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8455d400 r8:852e03ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852e0380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852e0380 r8:8027f5e8 r7:eb48de60 r6:852d9900 r5:8455d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb491fb0 to 0xeb491ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852e31c0 INFO: task kworker/1:533:4895 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: ac67a000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: r5:8455bc00 r4:82918808 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e3640 r5:00001000 r4:eb0c3000 r5:8545bf8c r4:8545bc00 r10:61c88647 r9:8455bc00 r8:852e042c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11a4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:8455e000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4a1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e3700 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8455e000 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0d7000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8545c38c r4:8545c000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8545c38c r4:852e0480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8455e000 r8:852e04ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852e0480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852e0480 r8:8027f5e8 r7:eb48de60 r6:852d9a00 r5:8455e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4a1fb0 to 0xeb4a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852e35c0 INFO: task kworker/1:535:4899 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: acbc1000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:536:4901 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:536 state:D stack:0 pid:4901 tgid:4901 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8291880c r9:eb4a9d84 r8:00000002 r7:60000013 r6:eb4a9d8c r5:85420c00 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:eb0ef000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8545c78c r4:852e0500 Exception stack(0xeb4a9fb0 to 0xeb4a9ff8) r4:852e3580 [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11a4 r4:00000000 r5:85a7af8c r4:85a7ac00 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:537:4903 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:537 state:D stack:0 pid:4903 tgid:4903 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb45dd84 r8:00000002 r7:60000013 r6:eb45dd8c r5:853f0c00 r4:853f0c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853f0c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb45de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e39c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853f0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2b9000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8545cb8c r4:8545c800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8545cb8c r4:852e0580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853f0c00 r8:852e05ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852e0580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852e0580 r8:8027f5e8 r7:eb48de60 r6:852e0600 r5:853f0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb45dfb0 to 0xeb45dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11a4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 INFO: task kworker/1:538:4905 blocked for more than 462 seconds. r4:853f1800 [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e3b40 r9:83018205 r8:853f1800 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb335000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8545cf8c r4:8545cc00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8545cf8c r4:852e0680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853f1800 r8:852e06ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852e0680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852e0680 r8:8027f5e8 r7:eb48de60 r6:852e0700 r5:853f1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4b1fb0 to 0xeb4b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852e3840 INFO: task kworker/1:538:4905 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: ad0c1000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:539:4908 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:539 state:D stack:0 pid:4908 tgid:4908 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb4b5d84 r8:00000002 r7:60000113 r6:eb4b5d8c r5:853f2400 r4:853f2400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853f2400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4b5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:eb4bb000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8545d78c r4:8545d400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8545d78c r4:852e0780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853f2400 r8:852e07ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852e0780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852e0780 r8:8027f5e8 r7:eb48de60 r6:852e0800 r5:853f2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4b5fb0 to 0xeb4b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852e3ac0 INFO: task kworker/1:539:4908 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: ad0c1000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:85a7af8c r4:85a7ac00 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e5a340 task:kworker/1:540 state:D stack:0 pid:4911 tgid:4911 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:eb4c7000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e47b9dc0 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:541 state:D stack:0 pid:4912 tgid:4912 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4c5e08 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4d3000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8545df8c r4:8545dc00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8545df8c r4:852e0980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853f3c00 r8:852e09ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852e0980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852e0980 r8:8027f5e8 r7:eb4b9e60 r6:852e0a00 r5:853f3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4c5fb0 to 0xeb4c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852e3dc0 INFO: task kworker/1:541:4912 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: ad800000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:542:4915 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:542 state:D stack:0 pid:4915 tgid:4915 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb4d1d84 r8:00000002 r7:60000113 r6:eb4d1d8c r5:853f5400 r4:853f5400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853f5400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4d1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d7fc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853f5400 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4df000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8545e38c r4:8545e000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8545e38c r4:852e0a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853f5400 r8:852e0aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852e0a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852e0a80 r8:8027f5e8 r7:eb4c5e60 r6:852e0b00 r5:853f5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4d1fb0 to 0xeb4d1ff8) 1fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:82ac11a4 r4:00000000 r5:85a7af8c r4:85a7ac00 r4:8454d780 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4f7000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: adc0f000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:544:4918 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:544 state:D stack:0 pid:4918 tgid:4918 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb4f5d84 r8:00000002 r7:60000113 r6:eb4f5d8c r5:853f0000 r4:853f0000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853f0000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4f5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8548f0c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb4e7000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8545e78c r4:8545e400 r10:61c88647 r9:853f0000 r8:852e0cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8548f180 Workqueue: events bpf_prog_free_deferred r4:00000000 9d60: 80230ad4 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:545:4920 blocked for more than 462 seconds. r4:853f6000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8548fd00 r5:00001000 r4:eb54b000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:852e0d80 r8:8027f5e8 r7:eb4f1e60 r6:852e0e00 r5:853f6000 Exception stack(0xeb50dfb0 to 0xeb50dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8548f000 INFO: task kworker/1:545:4920 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: ae216000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:351:4922 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:351 state:D stack:0 pid:4922 tgid:4922 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb425d84 r8:00000002 r7:60000113 r6:eb425d8c r5:85422400 r4:85422400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb50f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:853c8f8c r4:852d9b00 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb52b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:852e0e80 r8:8027f5e8 r7:eb50de60 r6:852d9c00 r5:85420000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8548f000 INFO: task kworker/1:546:4924 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: ae5de000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:352:4926 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:352 state:D stack:0 pid:4926 tgid:4926 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb519d84 r8:00000002 r7:60000113 r6:eb519d8c r5:85423000 r4:85423000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85423000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e6b40 r5:00001000 r4:eb51b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:853c938c r4:853c9000 r10:61c88647 r9:85423000 r8:852d9cac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 9d60: 80230ad4 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r5:85a7af8c r4:85a7ac00 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:eb533000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c978c r4:853c9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853c978c r4:852d9d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85423c00 r8:852d9dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852d9d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852d9d80 r8:8027f5e8 r7:eb2a1e60 r6:852d9e00 r5:85423c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb529fb0 to 0xeb529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852e6d40 INFO: task kworker/0:353:4927 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: af0d0000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:547:4929 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:547 state:D stack:0 pid:4929 tgid:4929 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb525d84 r8:00000002 r7:60000013 r6:eb525d8c r5:85424800 r4:85424800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85424800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb525e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8548fc40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85424800 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb53f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8545f38c r4:8545f000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8545f38c r4:852e0f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85424800 r8:852e0f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852e0f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852e0f00 r8:8027f5e8 r7:eb50de60 r6:852d9e80 r5:85424800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb525fb0 to 0xeb525ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8548f9c0 INFO: task kworker/1:547:4929 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:82ac11a4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:548:4933 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:548 state:D stack:0 pid:4933 tgid:4933 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb559d84 r8:00000002 r7:60000113 r6:eb559d8c r5:85426c00 r4:85426c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85426c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb559e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8548ff80 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85426c00 r7:00000000 r6:83018200 r5:00001000 r4:7f027000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 9d60: 80230ad4 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:85426000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c9000 r5:00001000 r4:eb55b000 r5:8545fb8c r4:8545f800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85426000 r8:8548102c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85481000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85481000 r8:8027f5e8 r7:eb559e60 r6:852d9f80 r5:85426000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3c1fb0 to 0xeb3c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8548fcc0 INFO: task kworker/1:549:4935 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: af0d0000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 INFO: task kworker/1:550:4937 blocked for more than 462 seconds. r5:8455ec00 r4:82918808 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:e068f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8455ec00 r8:854810ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:82ac11a4 r4:00000000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8454d780 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8291880c r9:eb389d84 r8:00000002 r7:60000013 r6:eb389d8c r5:85425400 r4:00000000 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85425400 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb5f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546078c r4:85460400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8546078c r4:85481100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85425400 r8:8548112c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85481100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85481100 r8:8027f5e8 r7:eb3d1e60 r6:85491080 r5:85425400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb389fb0 to 0xeb389ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8548ffc0 INFO: task kworker/1:551:4938 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: af71b000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:552:4941 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3f1e08 r5:00001000 r4:dfe5f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85460b8c r4:85481180 1fa0: 00000000 00000000 00000000 00000000 [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11a4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r5:85a7af8c r4:85a7ac00 r4:8454d780 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:354:4942 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:354 state:D stack:0 pid:4942 tgid:4942 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb419d84 r8:00000002 r7:60000113 r6:eb419d8c r5:85428000 r4:85428000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85428000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb419e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85492240 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85428000 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0715000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546138c r4:85461000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546138c r4:85491180 r10:00000000 r9:85491180 r8:8027f5e8 r7:eb2a1e60 r6:85491200 r5:85428000 Workqueue: events bpf_prog_free_deferred r4:00000000 9d60: 80230ad4 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r5:85a7af8c r4:85a7ac00 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb013000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb56dfb0 to 0xeb56dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: afff5000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:554:4946 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:554 state:D stack:0 pid:4946 tgid:4946 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb571d84 r8:00000002 r7:60000013 r6:eb571d8c r5:85428c00 r4:85428c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85428c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb571e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85492500 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85428c00 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabbb000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8546178c r4:85481300 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 r4:00000000 r5:85a7af8c r4:85a7ac00 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb569e08 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac35000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85491380 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: b0453000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:356:4952 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:356 state:D stack:0 pid:4952 tgid:4952 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb549d84 r8:00000002 r7:60000113 r6:eb549d8c r5:8542bc00 r4:8542bc00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8542bc00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb549e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85492700 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8542bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac81000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85461b8c r4:85461800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85461b8c r4:85491480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8542bc00 r8:854914ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85491480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85491480 r8:8027f5e8 r7:eb569e60 r6:85491500 r5:8542bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb549fb0 to 0xeb549ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:555:4953 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:555 state:D stack:0 pid:4953 tgid:4953 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb53dd84 r8:00000002 r7:60000013 r6:eb53dd8c r5:8542c800 r4:8542c800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ead33000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb53dfb0 to 0xeb53dff8) task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 9d60: 80230ad4 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:357 state:D stack:0 pid:4955 tgid:4955 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r9:83018005 r8:8542d400 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 r5:00001000 r4:eacdd000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8542d400 r8:8549162c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85491600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85491600 r8:8027f5e8 r7:eb549e60 r6:85491680 r5:8542d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb575fb0 to 0xeb575ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8548be00 INFO: task kworker/0:357:4955 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: b09df000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:358:4957 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:8542e000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85484dc0 r5:00001000 r4:eb3d5000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8546538c r4:85491700 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8291880c r9:eb581d84 r8:00000002 r7:60000113 r6:eb581d8c r5:8542ec00 r4:8542ec00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8542ec00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb581e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8548b1c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8542ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead63000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853ca78c r4:853ca400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853ca78c r4:85491800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8542ec00 r8:8549182c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85491800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85491800 r8:8027f5e8 r7:eb579e60 r6:85491880 r5:8542ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb581fb0 to 0xeb581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8548bd40 INFO: task kworker/0:359:4958 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: b139c000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8454d780 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae25000 r5:8546238c r4:85462000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: b139c000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:557:4963 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:557 state:D stack:0 pid:4963 tgid:4963 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb589d84 r8:00000002 r7:60000113 r6:eb589d8c r5:84d90000 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:84d90000 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 r5:00001000 r4:eae9f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb589fb0 to 0xeb589ff8) INFO: task kworker/1:557:4963 is blocked on a mutex likely owned by task kworker/1:171:3869. Exception stack(0xe47b9d28 to 0xe47b9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:558:4966 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:558 state:D stack:0 pid:4966 tgid:4966 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb595d84 r8:00000002 r7:60000013 r6:eb595d8c r5:84d92400 r4:84d92400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d92400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb595e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85492f00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84d92400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb10d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85462f8c r4:85462c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85462f8c r4:85481480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d92400 r8:854814ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85481480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85481480 r8:8027f5e8 r7:eb56de60 r6:85491a00 r5:84d92400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb595fb0 to 0xeb595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11a4 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:559 state:D stack:0 pid:4968 tgid:4968 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb59de08 r5:00001000 r4:eb14d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 r4:00000000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:8454d780 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:560:4970 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:560 state:D stack:0 pid:4970 tgid:4970 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb5a5d84 r8:00000002 r7:60000113 r6:eb5a5d8c r5:84d91800 r4:84d91800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d91800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5a5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e3f80 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84d91800 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1cd000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85463b8c r4:85463800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85463b8c r4:85481580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:854815ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85481580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85481580 r8:8027f5e8 r7:eb59de60 r6:85491b00 r5:84d91800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5a5fb0 to 0xeb5a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85492b00 INFO: task kworker/1:560:4970 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: b1f7c000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:561 state:D stack:0 pid:4971 tgid:4971 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d4b000 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84d94800 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb18d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546378c r4:85463400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8546378c r4:85481600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d94800 r8:8548162c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85481600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85481600 r8:8027f5e8 r7:eb5a5e60 r6:85491c00 r5:84d94800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5a9fb0 to 0xeb5a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85492b00 INFO: task kworker/1:561:4971 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: b20a6000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e5a340 task:kworker/0:360 state:D stack:0 pid:4972 tgid:4972 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5ade08 r5:00001000 r4:eb23f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84d95400 r8:85491bac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:82ac11a4 r4:e47b9dc0 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8454d780 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:562:4974 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:562 state:D stack:0 pid:4974 tgid:4974 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb5b5d84 r8:00000002 r7:60000113 r6:eb5b5d8c r5:84d93c00 r4:84d93c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d93c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5b5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854930c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84d93c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb211000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85463f8c r4:85463c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85463f8c r4:85481680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d93c00 r8:854816ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85481680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85481680 r8:8027f5e8 r7:eb5a5e60 r6:85491d00 r5:84d93c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5b5fb0 to 0xeb5b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85492980 INFO: task kworker/1:562:4974 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: b2409000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xe47b9fb0 to 0xe47b9ff8) Not tainted 6.15.0-syzkaller #0 r10:8291880c r9:eb5b9d84 r8:00000002 r7:60000013 r6:eb5b9d8c r5:84d90c00 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb261000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85481700 r8:8027f5e8 r7:eb5b5e60 r6:85491d80 r5:84d90c00 INFO: task kworker/1:563:4977 is blocked on a mutex likely owned by task kworker/1:171:3869. 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:564:4978 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:564 state:D stack:0 pid:4978 tgid:4978 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb5bdd84 r8:00000002 r7:60000013 r6:eb5bdd8c r5:84d96c00 r4:84d96c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d96c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5bde08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85493480 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84d96c00 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb285000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546478c r4:85464400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8546478c r4:85481780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d96c00 r8:854817ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85481780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85481780 r8:8027f5e8 r7:eb5b9e60 r6:85491e00 r5:84d96c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85493100 INFO: task kworker/1:564:4978 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: b2a8b000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:8291880c r9:eb5b1d84 r8:00000002 r7:60000113 r6:eb5b1d8c r5:84d96000 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb375000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:853caf8c r4:85491e80 Exception stack(0xeb5b1fb0 to 0xeb5b1ff8) INFO: task kworker/0:361:4981 is blocked on a mutex likely owned by task kworker/1:171:3869. 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:565:4983 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:565 state:D stack:0 pid:4983 tgid:4983 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb5c1d84 r8:00000002 r7:60000013 r6:eb5c1d8c r5:854f8000 r4:854f8000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854f8000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5c1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854935c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854f8000 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2ad000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85464b8c r4:85464800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85464b8c r4:85481800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854f8000 r8:8548182c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85481800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85481800 r8:8027f5e8 r7:eb5bde60 r6:85491f80 r5:854f8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5c1fb0 to 0xeb5c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85493000 INFO: task kworker/1:565:4983 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 r4:e47b9dc0 r5:00001000 r4:ece91000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:566 state:D stack:0 pid:4985 tgid:4985 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb38f000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85481880 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85493000 INFO: task kworker/1:566:4985 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: b2e02000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Not tainted 6.15.0-syzkaller #0 r4:853fa400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5c9e08 r5:00001000 r4:dfca7000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:853fa400 r8:854819ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb585e08 r9:83018005 r8:854f8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 r5:00001000 r4:eb3c7000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb585fb0 to 0xeb585ff8) task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:568:4991 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:568 state:D stack:0 pid:4991 tgid:4991 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb5c5d84 r8:00000002 r7:60000113 r6:eb5c5d8c r5:854f9800 r4:854f9800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854f9800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5c5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85493e80 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854f9800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3f5000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546578c r4:85465400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8546578c r4:85481a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854f9800 r8:85481aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85481a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85481a80 r8:8027f5e8 r7:eb5c9e60 r6:85497100 r5:854f9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5c5fb0 to 0xeb5c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85493900 INFO: task kworker/1:568:4991 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: b3395000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 r4:00000001 r4:84e5a340 task:kworker/0:363 state:D stack:0 pid:4993 tgid:4993 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb3e7000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:853cb78c r4:85497180 Exception stack(0xeb5cdfb0 to 0xeb5cdff8) INFO: task kworker/0:363:4993 is blocked on a mutex likely owned by task kworker/1:171:3869. Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: b3395000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb5d1d84 r8:00000002 r7:60000113 r6:eb5d1d8c r5:854fb000 r4:854fb000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854fb000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5d1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ae5c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:854fb000 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb49b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8454bf8c r4:8454bc00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8454bf8c r4:85497280 r4:85497280 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:82ac11a4 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eb32b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb5d9fb0 to 0xeb5d9ff8) INFO: task kworker/0:365:4996 is blocked on a mutex likely owned by task kworker/1:171:3869. 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e5a340 task:kworker/1:569 state:D stack:0 pid:4999 tgid:4999 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb407000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85465b8c r4:85481b00 Exception stack(0xeb41dfb0 to 0xeb41dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85493d80 INFO: task kworker/1:569:4999 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: b3b3c000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:570:5000 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:570 state:D stack:0 pid:5000 tgid:5000 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb4add84 r8:00000002 r7:60000113 r6:eb4add8c r5:854fe000 r4:854fe000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854fe000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4ade08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85493fc0 r4:00000000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e051f000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 r4:e47b9dc0 r5:00001000 r4:ece91000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:571:5001 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:571 state:D stack:0 pid:5001 tgid:5001 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb4c1d84 r8:00000002 r7:60000113 r6:eb4c1d8c r5:854fec00 r4:854fec00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854fec00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4c1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85493c40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854fec00 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0005000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546638c r4:85466000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8546638c r4:85481c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854fec00 r8:85481c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85481c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85481c00 r8:8027f5e8 r7:eb4ade60 r6:85497580 r5:854fec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4c1fb0 to 0xeb4c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85493fc0 INFO: task kworker/1:571:5001 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: b3f33000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe47b9fb0 to 0xe47b9ff8) Not tainted 6.15.0-syzkaller #0 r10:8291880c r9:eb4d9d84 r8:00000002 r7:60000113 r6:eb4d9d8c r5:85400c00 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:e8869000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 r4:e47b9dc0 r5:00001000 r4:ece91000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 INFO: task kworker/1:573:5007 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:573 state:D stack:0 pid:5007 tgid:5007 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb4ddd84 r8:00000002 r7:60000113 r6:eb4ddd8c r5:85401800 r4:85401800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85401800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4dde08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854830c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85401800 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05d3000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85466b8c r4:85466800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85466b8c r4:85481d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85401800 r8:85481d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85481d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85481d00 r8:8027f5e8 r7:eb4d9e60 r6:85497680 r5:85401800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4ddfb0 to 0xeb4ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85483040 INFO: task kworker/1:573:5007 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: b4345000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8454d780 Exception stack(0xe47b9fb0 to 0xe47b9ff8) Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb505e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85483380 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85400000 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47bb000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85466f8c r4:85466c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85466f8c r4:85481d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85400000 r8:85481dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85481d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85481d80 r8:8027f5e8 r7:eb4d9e60 r6:85497700 r5:85400000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb505fb0 to 0xeb505ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854832c0 INFO: task kworker/1:574:5009 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: b4664000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:575:5011 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:575 state:D stack:0 pid:5011 tgid:5011 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb521d84 r8:00000002 r7:60000013 r6:eb521d8c r5:85402400 r4:85402400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85402400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb521e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85483740 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85402400 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa4d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85467b8c r4:85467800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85467b8c r4:85481e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85402400 r8:85481e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85481e00 r10:00000000 r9:85481e00 r8:8027f5e8 r7:eb4d9e60 r6:85497780 r5:85402400 INFO: task kworker/1:575:5011 is blocked on a mutex likely owned by task kworker/1:171:3869. 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 r4:e47b9dc0 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:8454d780 Exception stack(0xe47b9fb0 to 0xe47b9ff8) Not tainted 6.15.0-syzkaller #0 r4:85403000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb545e08 r9:83018205 r8:85403000 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 r5:00001000 r4:ea9f9000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r5:85a7af8c r4:85a7ac00 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:577:5015 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:577 state:D stack:0 pid:5015 tgid:5015 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb561d84 r8:00000002 r7:60000013 r6:eb561d8c r5:85403c00 r4:85403c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85403c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb561e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85483880 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85403c00 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaabd000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85467f8c r4:85467c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85467f8c r4:85481f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85403c00 r8:85481f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85481f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85481f00 r8:8027f5e8 r7:eb521e60 r6:85497880 r5:85403c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb561fb0 to 0xeb561ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854833c0 INFO: task kworker/1:577:5015 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: b493e000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:578:5017 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:578 state:D stack:0 pid:5017 tgid:5017 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb5e5d84 r8:00000002 r7:60000113 r6:eb5e5d8c r5:85405400 r4:85405400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85405400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5e5e08 r4:00000000 r5:00001000 r4:eb0af000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85405400 r8:85481fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85483700 Workqueue: events bpf_prog_free_deferred 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 r4:00000000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:579:5019 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:579 state:D stack:0 pid:5019 tgid:5019 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb5e9d84 r8:00000002 r7:60000013 r6:eb5e9d8c r5:85406000 r4:85406000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85406000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5e9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85483a00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85406000 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab49000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546c38c r4:8546c000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8546c38c r4:8549f000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85406000 r8:8549f02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8549f000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8549f000 r8:8027f5e8 r7:eb5e5e60 r6:85497980 r5:85406000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5e9fb0 to 0xeb5e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 9d60: 80230ad4 80239bb0 80070013 ffffffff r4:00000000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:580:5021 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:580 state:D stack:0 pid:5021 tgid:5021 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb5f1d84 r8:00000002 r7:60000113 r6:eb5f1d8c r5:85404800 r4:85404800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85404800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5f1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85483b00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85404800 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead81000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546c78c r4:8546c400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8546c78c r4:8549f080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85404800 r8:8549f0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8549f080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe47b9d28 to 0xe47b9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:581 state:D stack:0 pid:5023 tgid:5023 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5f9e08 r5:00001000 r4:eaee9000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb5f9fb0 to 0xeb5f9ff8) INFO: task kworker/1:581:5023 is blocked on a mutex likely owned by task kworker/1:171:3869. 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eafc9000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8546cf8c r4:8546cc00 r10:61c88647 r9:84c79800 r8:8549f1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8549f180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8549f180 r8:8027f5e8 r7:eb5e5e60 r6:85497b00 r5:84c79800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb601fb0 to 0xeb601ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85483980 INFO: task kworker/1:582:5025 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: b55bf000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:583:5027 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:583 state:D stack:0 pid:5027 tgid:5027 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb5ddd84 r8:00000002 r7:60000113 r6:eb5ddd8c r5:853f8000 r4:853f8000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853f8000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5dde08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85483ec0 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb07b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546d38c r4:8546d000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8546d38c r4:8549f200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853f8000 r8:8549f22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8549f200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8549f200 r8:8027f5e8 r7:eb5e5e60 r6:8549f280 r5:853f8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5ddfb0 to 0xeb5ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85483b80 INFO: task kworker/1:583:5027 is blocked on a mutex likely owned by task kworker/1:171:3869. Workqueue: events bpf_prog_free_deferred 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 r4:00000000 r5:85a7af8c r4:85a7ac00 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:853fc800 r4:82918808 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb605e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8548f140 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853fc800 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0d3000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546db8c r4:8546d800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8546db8c r4:8549f300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853fc800 r8:8549f32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8549f300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8549f300 r8:8027f5e8 r7:eb5e5e60 r6:8549f380 r5:853fc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb605fb0 to 0xeb605ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85483e80 INFO: task kworker/1:584:5030 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: b5a90000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xe47b9fb0 to 0xe47b9ff8) Not tainted 6.15.0-syzkaller #0 r4:853fd400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5d5e08 r5:00001000 r4:eb41f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8546e38c r4:8549f400 Exception stack(0xeb5d5fb0 to 0xeb5d5ff8) r4:85483e80 Workqueue: events bpf_prog_free_deferred 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:586 state:D stack:0 pid:5033 tgid:5033 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb60de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a8140 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853fe000 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0eb000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546df8c r4:8546dc00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8546df8c r4:8549f500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853fe000 r8:8549f52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8549f500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8549f500 r8:8027f5e8 r7:eb5d5e60 r6:8549f580 r5:853fe000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb60dfb0 to 0xeb60dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854a8080 INFO: task kworker/1:586:5033 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: b5dd6000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb611e08 r5:00001000 r4:eb33d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb611fb0 to 0xeb611ff8) task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11a4 r4:e47b9dc0 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:587:5040 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:587 state:D stack:0 pid:5040 tgid:5040 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb621d84 r8:00000002 r7:60000013 r6:eb621d8c r5:84c7c800 r4:84c7c800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c7c800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb621e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a8740 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84c7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb44b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546eb8c r4:8546e800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8546eb8c r4:8549f600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c7c800 r8:8549f62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8549f600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8549f600 r8:8027f5e8 r7:eb5d5e60 r6:85497c80 r5:84c7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb621fb0 to 0xeb621ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r5:85a7af8c r4:85a7ac00 r4:8454d780 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8291880c r9:eb625d84 r8:00000002 r7:60000013 r6:eb625d8c r5:84c7d400 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb487000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8454938c r4:85497d00 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: b5ff6000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:588:5042 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:588 state:D stack:0 pid:5042 tgid:5042 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb629d84 r8:00000002 r7:60000013 r6:eb629d8c r5:84c78c00 r4:84c78c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c78c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb629e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a8600 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84c78c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb437000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546e78c r4:8546e400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8546e78c r4:8549f680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c78c00 r8:8549f6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8549f680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8549f680 r8:8027f5e8 r7:eb621e60 r6:85497e00 r5:84c78c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb629fb0 to 0xeb629ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854a8400 INFO: task kworker/1:588:5042 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: b6313000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 INFO: task kworker/1:589:5043 blocked for more than 463 seconds. r4:84c7e000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb62de08 r5:00001000 r4:eb4e3000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8546f38c r4:8549f700 Exception stack(0xeb62dfb0 to 0xeb62dff8) task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11a4 r4:00000000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:590:5045 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:590 state:D stack:0 pid:5045 tgid:5045 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb61dd84 r8:00000002 r7:60000113 r6:eb61dd8c r5:853fb000 r4:853fb000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853fb000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb61de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a8ac0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853fb000 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4bd000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546ef8c r4:8546ec00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8546ef8c r4:8549f780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853fb000 r8:8549f7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8549f780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8549f780 r8:8027f5e8 r7:eb62de60 r6:8549f800 r5:853fb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb61dfb0 to 0xeb61dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854a8400 INFO: task kworker/1:590:5045 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:82ac11a4 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xe47b9fb0 to 0xe47b9ff8) INFO: task kworker/0:368:5048 blocked for more than 463 seconds. r4:84c7ec00 [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb619e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85578ac0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84c7ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb27d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854e078c r4:854e0400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854e078c r4:85497f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c7ec00 r8:85497f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85497f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85497f00 r8:8027f5e8 r7:eb5d1e60 r6:85497f80 r5:84c7ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb619fb0 to 0xeb619ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854ae440 INFO: task kworker/0:368:5048 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: b6aba000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb241000 r5:854e038c r4:854e0000 r7:dddced80 r6:83018000 r5:854e038c r4:854ac000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:591:5052 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:591 state:D stack:0 pid:5052 tgid:5052 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb635d84 r8:00000002 r7:60000113 r6:eb635d8c r5:84c7b000 r4:84c7b000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c7b000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb635e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a8e40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84c7b000 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb51d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546fb8c r4:8546f800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8546fb8c r4:8549f880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c7b000 r8:8549f8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8549f880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8549f880 r8:8027f5e8 r7:eb62de60 r6:854ac100 r5:84c7b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb635fb0 to 0xeb635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854a8400 INFO: task kworker/1:591:5052 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: b6e09000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:00000000 r5:00001000 r4:ece91000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:592 state:D stack:0 pid:5054 tgid:5054 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb4fb000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb63dfb0 to 0xeb63dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854a8b40 INFO: task kworker/1:592:5054 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: b6f6f000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:593:5055 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:593 state:D stack:0 pid:5055 tgid:5055 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb641d84 r8:00000002 r7:60000013 r6:eb641d8c r5:85406c00 r4:85406c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85406c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb641e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a8fc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85406c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb535000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546ff8c r4:8546fc00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8546ff8c r4:8549f980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85406c00 r8:8549f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8549f980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8549f980 r8:8027f5e8 r7:eb635e60 r6:854ac200 r5:85406c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb641fb0 to 0xeb641ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe47b9d28 to 0xe47b9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 r4:85509800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb655e08 r5:00001000 r4:eb64b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8547438c r4:85474000 r4:8549fa00 Exception stack(0xeb655fb0 to 0xeb655ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854a8dc0 INFO: task kworker/1:594:5058 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: b72f7000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:595:5060 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:595 state:D stack:0 pid:5060 tgid:5060 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb65f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8547478c r4:8549fa80 Exception stack(0xeb65dfb0 to 0xeb65dff8) task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:8291880c r9:eb631d84 r8:00000002 r7:60000013 r6:eb631d8c r5:853fbc00 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb66b000 r5:85474b8c r4:85474800 r4:8549fb00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:597:5063 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:597 state:D stack:0 pid:5063 tgid:5063 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb639d84 r8:00000002 r7:60000113 r6:eb639d8c r5:853f9800 r4:853f9800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853f9800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb639e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a94c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853f9800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb677000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85474f8c r4:85474c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85474f8c r4:8549fc00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853f9800 r8:8549fc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8549fc00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8549fc00 r8:8027f5e8 r7:eb631e60 r6:8549fc80 r5:853f9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb639fb0 to 0xeb639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 INFO: task kworker/1:597:5063 is blocked on a mutex likely owned by task kworker/1:171:3869. Exception stack(0xe47b9d28 to 0xe47b9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r5:85a7af8c r4:85a7ac00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: r5:853fec00 r4:82918808 r4:00000000 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853fec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6c7000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8547678c r4:85476400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8547678c r4:8549fd00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853fec00 r8:8549fd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8549fd00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8549fd00 r8:8027f5e8 r7:eb639e60 r6:8549fd80 r5:853fec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb669fb0 to 0xeb669ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854a9540 INFO: task kworker/1:598:5066 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: b7bd4000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:599:5068 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:599 state:D stack:0 pid:5068 tgid:5068 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb695d84 r8:00000002 r7:60000113 r6:eb695d8c r5:8550b000 r4:8550b000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8550b000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb695e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a9440 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb683000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8547538c r4:85475000 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11a4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:8550a400 r4:82918808 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb68f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8547578c r4:8549fe80 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:82ac11a4 r4:e47b9dc0 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:601:5071 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:601 state:D stack:0 pid:5071 tgid:5071 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb681d84 r8:00000002 r7:60000113 r6:eb681d8c r5:853f4800 r4:853f4800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853f4800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb681e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a98c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853f4800 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6a3000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85475b8c r4:85475800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85475b8c r4:8549ff00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853f4800 r8:8549ff2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8549ff00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8549ff00 r8:8027f5e8 r7:eb669e60 r6:8549ff80 r5:853f4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb681fb0 to 0xeb681ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854a9600 INFO: task kworker/1:601:5071 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: b8067000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:eb6af000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85475f8c r4:85475c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85475f8c r4:854f5000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853ea400 r8:854f502c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854f5000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f5000 r8:8027f5e8 r7:eb669e60 r6:854f5080 r5:853ea400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6a1fb0 to 0xeb6a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854a9880 INFO: task kworker/1:602:5075 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: b8537000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6bb000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:603:5076 is blocked on a mutex likely owned by task kworker/1:171:3869. Exception stack(0xe47b9d28 to 0xe47b9d70) [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:dfa3b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85530c00 r8:854f522c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854f5200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f5200 r8:8027f5e8 r7:eb669e60 r6:854f5280 r5:85530c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6c5fb0 to 0xeb6c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854a9b80 INFO: task kworker/1:604:5078 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: b8537000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe47b9fb0 to 0xe47b9ff8) INFO: task kworker/1:605:5080 blocked for more than 463 seconds. r4:85531800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6d1e08 r5:00001000 r4:dfa77000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85476f8c r4:854f5300 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:82ac11a4 r4:00000000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:8291880c r9:ea911d84 r8:00000002 r7:60000013 r6:ea911d8c r5:85532400 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:dfbdd000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8547738c r4:854f5400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85532400 r8:854f542c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854f5400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f5400 r8:8027f5e8 r7:eb6d1e60 r6:854f5480 r5:85532400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea911fb0 to 0xea911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854a9dc0 INFO: task kworker/1:606:5082 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: b8de1000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:607:5084 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:607 state:D stack:0 pid:5084 tgid:5084 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb6d5d84 r8:00000002 r7:60000113 r6:eb6d5d8c r5:85533000 r4:85533000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85533000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6d5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85574380 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85533000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e074d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85477b8c r4:85477800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85477b8c r4:854f5500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85533000 r8:854f552c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854f5500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f5500 r8:8027f5e8 r7:ea911e60 r6:854f5580 r5:85533000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6d5fb0 to 0xeb6d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85574080 INFO: task kworker/1:607:5084 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: b8de1000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ece91000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xe47b9fb0 to 0xe47b9ff8) Not tainted 6.15.0-syzkaller #0 r10:8291880c r9:eb675d84 r8:00000002 r7:60000013 r6:eb675d8c r5:85533c00 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85574040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85533c00 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0641000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8547778c r4:85477400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8547778c r4:854f5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85533c00 r8:854f562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854f5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f5600 r8:8027f5e8 r7:eb6d5e60 r6:854f5680 r5:85533c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb675fb0 to 0xeb675ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85574080 INFO: task kworker/1:608:5085 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: b90f1000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:609:5087 blocked for more than 463 seconds. Call trace: [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:85534800 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 r5:00001000 r4:ea94d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85477f8c r4:85477c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85477f8c r4:854f5700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85534800 r8:854f572c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854f5700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f5700 r8:8027f5e8 r7:eb6d5e60 r6:854f5780 r5:85534800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6d9fb0 to 0xeb6d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:855742c0 INFO: task kworker/1:609:5087 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: b90f1000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:610:5090 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:610 state:D stack:0 pid:5090 tgid:5090 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb6e1d84 r8:00000002 r7:60000113 r6:eb6e1d8c r5:85535400 r4:85535400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85535400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6e1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85574640 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85535400 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac1f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855a438c r4:855a4000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855a438c r4:854f5880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85535400 r8:854f58ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854f5880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f5880 r8:8027f5e8 r7:eb6d9e60 r6:854f5900 r5:85535400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6e1fb0 to 0xeb6e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85574600 INFO: task kworker/1:610:5090 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: b90f1000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:611:5093 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:611 state:D stack:0 pid:5093 tgid:5093 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb6e5d84 r8:00000002 r7:60000013 r6:eb6e5d8c r5:85536000 r4:85536000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85536000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6e5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855747c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85536000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac8d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:854f5800 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:611:5093 is blocked on a mutex likely owned by task kworker/1:171:3869. Call trace: r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 Exception stack(0xe47b9d28 to 0xe47b9d70) r5:80070013 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r5:85a7af8c r4:85a7ac00 r4:8454d780 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead19000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855a4b8c r4:855a4800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855a4b8c r4:854f5a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85536c00 r8:854f5a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854f5a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f5a00 r8:8027f5e8 r7:eb6e5e60 r6:854f5a80 r5:85536c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6e9fb0 to 0xeb6e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85574500 INFO: task kworker/1:612:5094 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: b99a0000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:613:5097 blocked for more than 464 seconds. Workqueue: events bpf_prog_free_deferred r10:8291880c r9:eb6f1d84 r8:00000002 r7:60000013 r6:eb6f1d8c r5:85538000 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae53000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855a538c r4:855a5000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855a538c r4:854f5b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85538000 r8:854f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854f5b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f5b00 r8:8027f5e8 r7:eb6e9e60 r6:854f5b80 r5:85538000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6f1fb0 to 0xeb6f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85574740 INFO: task kworker/1:613:5097 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: b99a0000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:8454d780 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8291880c r9:eb6ddd84 r8:00000002 r7:60000113 r6:eb6ddd8c r5:85538c00 r4:00000000 r4:00000000 r5:00001000 r4:ead5f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:855a4f8c r4:855a4c00 r10:61c88647 r9:85538c00 r8:854f5c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:615:5101 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:615 state:D stack:0 pid:5101 tgid:5101 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb6f5d84 r8:00000002 r7:60000013 r6:eb6f5d8c r5:85539800 r4:85539800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85539800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6f5e08 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85574dc0 r5:00001000 r4:eaea5000 r4:00000001 task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: b9fb9000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:616:5102 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8291880c r9:eb6f9d84 r8:00000002 r7:60000013 r6:eb6f9d8c r5:8553a400 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb10b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:855a5b8c r4:855a5800 r10:61c88647 r9:8553a400 r8:854f5e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:616:5102 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: b9fb9000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8291880c r9:eb701d84 r8:00000002 r7:60000013 r6:eb701d8c r5:8553c800 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854aeb40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8553c800 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb16f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855a5f8c r4:855a5c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855a5f8c r4:854f5f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8553c800 r8:854f5f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854f5f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f5f00 r8:8027f5e8 r7:eb6f9e60 r6:854f5f80 r5:8553c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb701fb0 to 0xeb701ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85574e00 INFO: task kworker/1:617:5104 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: b9fb9000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-syzkaller #0 r4:8553d400 [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb1e9000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb705fb0 to 0xeb705ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 r5:80070013 r4:80239bb0 r4:e47b9dc0 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:8454d780 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:619 state:D stack:0 pid:5109 tgid:5109 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8291880c r9:eb70dd84 r8:00000002 r7:60000113 r6:eb70dd8c r5:8553b000 r4:8553b000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8553b000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb70de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85587dc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8553b000 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3d3000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855a6b8c r4:855a6800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855a6b8c r4:85588100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8553b000 r8:8558812c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85588100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85588100 r8:8027f5e8 r7:eb705e60 r6:85588180 r5:8553b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb70dfb0 to 0xeb70dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85587240 INFO: task kworker/1:619:5109 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: ba58c000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:370:5111 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 task:kworker/0:370 state:D stack:0 pid:5111 tgid:5111 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb715e08 r9:83018005 r8:8553bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 r5:00001000 r4:eb887000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:854e1f8c r4:854ac480 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r4:85540000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85540000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb71de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85578c00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85540000 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb299000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854e0b8c r4:854e0800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854e0b8c r4:854ac500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85540000 r8:854ac52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854ac500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ac500 r8:8027f5e8 r7:eb715e60 r6:85588280 r5:85540000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb71dfb0 to 0xeb71dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85578780 INFO: task kworker/0:371:5112 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: ba83d000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85a7af8c r4:85a7ac00 r4:8454d780 Exception stack(0xe47b9fb0 to 0xe47b9ff8) Not tainted 6.15.0-syzkaller #0 r4:85540c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb721e08 r5:00001000 r4:eb3ba000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: ba83d000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:372:5115 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:372 state:D stack:0 pid:5115 tgid:5115 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:85542400 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb383000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854e0f8c r4:854e0c00 r7:dddced80 r6:83018000 r5:854e0f8c r4:854ac580 Exception stack(0xeb729fb0 to 0xeb729ff8) task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:373:5117 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:373 state:D stack:0 pid:5117 tgid:5117 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb731d84 r8:00000002 r7:60000113 r6:eb731d8c r5:85543c00 r4:85543c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85543c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb731e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8559b900 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85543c00 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb453000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854e178c r4:854e1400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854e178c r4:854ac600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85543c00 r8:854ac62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854ac600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ac600 r8:8027f5e8 r7:eb715e60 r6:85588480 r5:85543c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb731fb0 to 0xeb731ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85578bc0 INFO: task kworker/0:373:5117 is blocked on a mutex likely owned by task kworker/1:171:3869. Call trace: Exception stack(0xe47b9d28 to 0xe47b9d70) 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:621:5121 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:621 state:D stack:0 pid:5121 tgid:5121 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb72dd84 r8:00000002 r7:60000113 r6:eb72dd8c r5:85541800 r4:85541800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85541800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb72de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85587f00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85541800 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3e9000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855a6f8c r4:855a6c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855a6f8c r4:85588500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85541800 r8:8558852c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85588500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85588500 r8:8027f5e8 r7:eb70de60 r6:85588580 r5:85541800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb72dfb0 to 0xeb72dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85587bc0 INFO: task kworker/1:621:5121 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 Exception stack(0xe47b9d28 to 0xe47b9d70) r4:82ac11a4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb565000 r5:855a7b8c r4:855a7800 r10:61c88647 r9:85544800 r8:8558862c r7:82804d40 r6:ddde2d80 r5:ddde2da0 INFO: task kworker/1:622:5123 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: bae83000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:623:5125 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:623 state:D stack:0 pid:5125 tgid:5125 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb735d84 r8:00000002 r7:60000013 r6:eb735d8c r5:85545400 r4:85545400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85545400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb735e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85587880 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85545400 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb403000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855a738c r4:855a7000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855a738c r4:85588700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85545400 r8:8558872c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85588700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85588700 r8:8027f5e8 r7:eb709e60 r6:85588780 r5:85545400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb735fb0 to 0xeb735ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85587ec0 INFO: task kworker/1:623:5125 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: bb1c7000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:624:5127 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:624 state:D stack:0 pid:5127 tgid:5127 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb739d84 r8:00000002 r7:60000013 r6:eb739d8c r5:85546000 r4:85546000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85546000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb739e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85587240 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85546000 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb413000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855a778c r4:855a7400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855a778c r4:85588800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85546000 r8:8558882c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85588800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85588800 r8:8027f5e8 r7:eb709e60 r6:85588880 r5:85546000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb739fb0 to 0xeb739ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85574fc0 INFO: task kworker/1:624:5127 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: bb1c7000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:625:5129 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:625 state:D stack:0 pid:5129 tgid:5129 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb73dd84 r8:00000002 r7:60000113 r6:eb73dd8c r5:85546c00 r4:85546c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85546c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb73de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85583100 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85546c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb599000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855a7f8c r4:855a7c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855a7f8c r4:85588900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85546c00 r8:8558892c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85588900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85588900 r8:8027f5e8 r7:eb709e60 r6:85588980 r5:85546c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb73dfb0 to 0xeb73dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85583040 INFO: task kworker/1:625:5129 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: bb5a4000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:626:5131 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:626 state:D stack:0 pid:5131 tgid:5131 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb741d84 r8:00000002 r7:60000013 r6:eb741d8c r5:85543000 r4:85543000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85543000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb741e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85583300 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85543000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb745000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855b438c r4:855b4000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855b438c r4:85588a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85543000 r8:85588a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85588a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 9d60: 80230ad4 80239bb0 80070013 ffffffff [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:00001000 r4:ece91000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:627:5133 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:627 state:D stack:0 pid:5133 tgid:5133 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb749d84 r8:00000002 r7:60000113 r6:eb749d8c r5:8553ec00 r4:8553ec00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8553ec00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb749e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85583480 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8553ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb751000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855b478c r4:855b4400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855b478c r4:85588b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8553ec00 r8:85588b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85588b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85588b00 r8:8027f5e8 r7:eb741e60 r6:85588b80 r5:8553ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb749fb0 to 0xeb749ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85583380 INFO: task kworker/1:627:5133 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: bbb8b000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:628:5134 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:628 state:D stack:0 pid:5134 tgid:5134 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb6fdd84 r8:00000002 r7:60000113 r6:eb6fdd8c r5:8553e000 r4:8553e000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8553e000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6fde08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85583840 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8553e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb769000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855b4f8c r4:855b4c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855b4f8c r4:85588c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8553e000 r8:85588c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85588c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85588c00 r8:8027f5e8 r7:eb749e60 r6:85588c80 r5:8553e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6fdfb0 to 0xeb6fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85583380 INFO: task kworker/1:628:5134 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: bbb8b000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:629:5136 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:629 state:D stack:0 pid:5136 tgid:5136 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb755d84 r8:00000002 r7:60000013 r6:eb755d8c r5:85548000 r4:85548000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85548000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb755e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85583600 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85548000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb75d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855b4b8c r4:855b4800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855b4b8c r4:85588d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85548000 r8:85588d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85588d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85588d00 r8:8027f5e8 r7:eb6fde60 r6:85588d80 r5:85548000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb755fb0 to 0xeb755ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85583280 INFO: task kworker/1:629:5136 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: bbc0c000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:630:5139 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:630 state:D stack:0 pid:5139 tgid:5139 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb761d84 r8:00000002 r7:60000113 r6:eb761d8c r5:85548c00 r4:85548c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85548c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb761e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85583b00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85548c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb781000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855b578c r4:855b5400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855b578c r4:85588e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85548c00 r8:85588e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85588e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85588e00 r8:8027f5e8 r7:eb6fde60 r6:85588e80 r5:85548c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb761fb0 to 0xeb761ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85583640 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:82ac11a4 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:631:5141 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:631 state:D stack:0 pid:5141 tgid:5141 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb779e08 r5:00001000 r4:eb775000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:855b538c r4:85588f00 Exception stack(0xeb779fb0 to 0xeb779ff8) Call trace: Exception stack(0xe47b9d28 to 0xe47b9d70) [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85583c80 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8554a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb78d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855b5b8c r4:855b5800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855b5b8c r4:85593000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8554a400 r8:8559302c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85593000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85593000 r8:8027f5e8 r7:eb761e60 r6:85593080 r5:8554a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb785fb0 to 0xeb785ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:855838c0 INFO: task kworker/1:632:5143 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: bc27a000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8554b000 r4:00000000 r4:00000000 r5:00001000 r4:eb799000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8554b000 r8:855931ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe47b9fb0 to 0xe47b9ff8) task:kworker/1:634 state:D stack:0 pid:5147 tgid:5147 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb7a5000 r5:855b638c r4:855b6000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855b638c r4:85593100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8554bc00 r8:8559312c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85593100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85593100 r8:8027f5e8 r7:eb791e60 r6:85593280 r5:8554bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb79dfb0 to 0xeb79dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85583c40 INFO: task kworker/1:634:5147 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: bc6ea000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:635:5149 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8291880c r9:eb7a9d84 r8:00000002 r7:60000013 r6:eb7a9d8c r5:8554c800 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb7b1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:855b678c r4:855b6400 r4:85593300 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:8291880c r9:eb7b5d84 r8:00000002 r7:60000113 r6:eb7b5d8c r5:8554d400 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:dfa9f000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85593400 r8:8027f5e8 r7:eb7a9e60 r6:85593480 r5:8554d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7b5fb0 to 0xeb7b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:855a0040 INFO: task kworker/1:636:5151 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: bca22000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:637:5153 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:637 state:D stack:0 pid:5153 tgid:5153 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb7cdd84 r8:00000002 r7:60000013 r6:eb7cdd8c r5:8554e000 r4:8554e000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8554e000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7cde08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855a0100 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8554e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7bd000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855b6b8c r4:855b6800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855b6b8c r4:85593500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8554e000 r8:8559352c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85593500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85593500 r8:8027f5e8 r7:eb7b5e60 r6:85593580 r5:8554e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7cdfb0 to 0xeb7cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:855a0240 INFO: task kworker/1:637:5153 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: bca22000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 r4:e47b9dc0 r5:00001000 r4:ece91000 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7c9000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85593600 r8:8027f5e8 r7:eb7b5e60 r6:85593680 r5:8554ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb76dfb0 to 0xeb76dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:855a0240 INFO: task kworker/1:638:5154 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: bcc9d000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:639:5158 blocked for more than 464 seconds. Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdf3000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:855b778c r4:85593700 Exception stack(0xeb7d9fb0 to 0xeb7d9ff8) task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11a4 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:640:5159 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:640 state:D stack:0 pid:5159 tgid:5159 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb4edd84 r8:00000002 r7:60000113 r6:eb4edd8c r5:85550c00 r4:85550c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85550c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4ede08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855a0940 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85550c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05b7000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855b7f8c r4:855b7c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855b7f8c r4:85593800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85550c00 r8:8559382c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85593800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85593800 r8:8027f5e8 r7:eb7d9e60 r6:85593880 r5:85550c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe47b9d28 to 0xe47b9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85551800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb515e08 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bd000 r7:ddde2d80 r6:83018200 r5:855b7b8c r4:85593900 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 9d60: 80230ad4 80239bb0 80070013 ffffffff r4:00000000 r5:85a7af8c r4:85a7ac00 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e5a340 Workqueue: events bpf_prog_free_deferred [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855a0b00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85552400 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47df000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855c038c r4:855c0000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855c038c r4:85593a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85552400 r8:85593a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85593a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85593a00 r8:8027f5e8 r7:eb4ede60 r6:85593a80 r5:85552400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4cdfb0 to 0xeb4cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:855a0740 INFO: task kworker/1:642:5163 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: bd79d000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/1:643 state:D stack:0 pid:5165 tgid:5165 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ea9c9000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:855a0980 Call trace: Exception stack(0xe47b9d28 to 0xe47b9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:8454d780 Exception stack(0xe47b9fb0 to 0xe47b9ff8) Not tainted 6.15.0-syzkaller #0 r4:85553c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb651e08 r5:00001000 r4:eb097000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855c1f8c r4:855c1c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855c1f8c r4:85593c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85553c00 r8:85593c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85593c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85593c00 r8:8027f5e8 r7:eb645e60 r6:85593c80 r5:85553c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb651fb0 to 0xeb651ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:855a0d00 INFO: task kworker/1:644:5168 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: bdb96000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:645:5170 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:645 state:D stack:0 pid:5170 tgid:5170 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb671d84 r8:00000002 r7:60000113 r6:eb671d8c r5:85554800 r4:85554800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85554800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb671e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855a0dc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85554800 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa49000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855c0b8c r4:855c0800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855c0b8c r4:85593d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85554800 r8:85593d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85593d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85593d00 r8:8027f5e8 r7:eb651e60 r6:85593d80 r5:85554800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb671fb0 to 0xeb671ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:855a0bc0 INFO: task kworker/1:645:5170 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: bdb96000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 r4:82ac11a4 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85555400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb665e08 r5:00001000 r4:eaae5000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:855c0f8c r4:85593e00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe47b9d28 to 0xe47b9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r4:84e5a340 Workqueue: events bpf_prog_free_deferred r5:85556000 r4:82918808 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:eab9f000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855c138c r4:855c1000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855c138c r4:85593f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85556000 r8:85593f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85593f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85593f00 r8:8027f5e8 r7:eb651e60 r6:85593f80 r5:85556000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb67dfb0 to 0xeb67dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:855ee080 INFO: task kworker/1:647:5173 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: bdf22000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eaec9000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:855c178c r4:855f2000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:82ac11a4 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:649:5177 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:649 state:D stack:0 pid:5177 tgid:5177 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb699d84 r8:00000002 r7:60000113 r6:eb699d8c r5:85558000 r4:85558000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85558000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb699e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ee440 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85558000 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafed000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855c1b8c r4:855c1800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855c1b8c r4:855f2100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85558000 r8:855f212c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855f2100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855f2100 r8:8027f5e8 r7:eb651e60 r6:855f2180 r5:85558000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb699fb0 to 0xeb699ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:855ee2c0 INFO: task kworker/1:649:5177 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: be297000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r4:84e5a340 task:kworker/1:650 state:D stack:0 pid:5179 tgid:5179 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb0c5000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855c238c r4:855c2000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855c238c r4:855f2200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85558c00 r8:855f222c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855f2200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855f2200 r8:8027f5e8 r7:eb651e60 r6:855f2280 r5:85558c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6a9fb0 to 0xeb6a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:855ee480 INFO: task kworker/1:650:5179 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: be527000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:651 state:D stack:0 pid:5180 tgid:5180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb6add84 r8:00000002 r7:60000113 r6:eb6add8c r5:85559800 r4:85559800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85559800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6ade08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ee940 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb0f7000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85559800 r8:855f232c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:82ac11a4 r4:00000000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8555a400 r5:8555a400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6b5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855eebc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8555a400 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb35f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855c2f8c r4:855c2c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855c2f8c r4:855f2400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8555a400 r8:855f242c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855f2400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855f2400 r8:8027f5e8 r7:eb6ade60 r6:855f2480 r5:8555a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6b5fb0 to 0xeb6b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: be8c5000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84e5a340 Workqueue: events bpf_prog_free_deferred [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eb333000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:855f2500 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: bec19000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:654:5187 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:654 state:D stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb7ddd84 r8:00000002 r7:60000013 r6:eb7ddd8c r5:8555c800 r4:8555c800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8555c800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7dde08 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb4c9000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:855f2600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855f2600 r8:8027f5e8 r7:eb6b5e60 r6:855f2680 r5:8555c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7ddfb0 to 0xeb7ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:855eea40 INFO: task kworker/1:654:5187 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: bef21000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:00001000 r4:ece91000 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:8555e000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 r5:00001000 r4:eb495000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:855f2700 r8:8027f5e8 r7:eb7dde60 r6:855f2780 r5:8555e000 INFO: task kworker/1:655:5191 is blocked on a mutex likely owned by task kworker/1:171:3869. 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:374:5192 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:374 state:D stack:0 pid:5192 tgid:5192 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb7edd84 r8:00000002 r7:60000113 r6:eb7edd8c r5:8555ec00 r4:8555ec00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7ede08 r5:00001000 r4:eb511000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:854e1b8c r4:854ac680 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe47b9d28 to 0xe47b9d70) r4:82ac11a4 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7f1e08 r5:00001000 r4:eb4e9000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:855c3b8c r4:855f2880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85560000 r8:855f28ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855f2880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855f2880 r8:8027f5e8 r7:eb7dde60 r6:855f2900 r5:85560000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7f1fb0 to 0xeb7f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:855fb080 INFO: task kworker/1:656:5193 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: bf2af000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:657:5196 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:657 state:D stack:0 pid:5196 tgid:5196 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb6c1d84 r8:00000002 r7:60000013 r6:eb6c1d8c r5:85508c00 r4:85508c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85508c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6c1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855fb840 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85508c00 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5e1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85508c00 r8:855f29ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: bfac5000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:375:5198 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:ea9f1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:854ac780 r8:8027f5e8 r7:eb715e60 r6:854ac800 r5:8550e000 INFO: task kworker/0:375:5198 is blocked on a mutex likely owned by task kworker/1:171:3869. r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:658:5199 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:658 state:D stack:0 pid:5199 tgid:5199 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb7e1d84 r8:00000002 r7:60000113 r6:eb7e1d8c r5:8550ec00 r4:8550ec00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8550ec00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7e1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855fb640 r5:00001000 r4:eb537000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:855c3f8c r4:855c3c00 r10:61c88647 r9:8550ec00 r8:855f2a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855fb300 Call trace: Exception stack(0xe47b9d28 to 0xe47b9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe47b9fb0 to 0xe47b9ff8) Not tainted 6.15.0-syzkaller #0 r4:8550c800 [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb54f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:660:5205 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:660 state:D stack:0 pid:5205 tgid:5205 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb80dd84 r8:00000002 r7:60000013 r6:eb80dd8c r5:84d00c00 r4:84d00c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d00c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb80de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855fbb00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb609000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:855ccf8c r4:855f2b00 Exception stack(0xeb80dfb0 to 0xeb80dff8) task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11a4 r4:00000000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r4:84e5a340 Workqueue: events bpf_prog_free_deferred [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eb5f5000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb7e5fb0 to 0xeb7e5ff8) task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:85a7af8c r4:85a7ac00 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:662:5208 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:662 state:D stack:0 pid:5208 tgid:5208 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb801d84 r8:00000002 r7:60000013 r6:eb801d8c r5:85562400 r4:85562400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85562400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb801e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855fbc80 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85562400 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb657000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855cd38c r4:855cd000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855cd38c r4:855f2c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85562400 r8:855f2cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855f2c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855f2c80 r8:8027f5e8 r7:eb80de60 r6:855f2d00 r5:85562400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb801fb0 to 0xeb801ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:855fb900 INFO: task kworker/1:662:5208 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: c0b60000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85a7af8c r4:85a7ac00 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855fbe40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85563000 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb679000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855cd78c r4:855cd400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855cd78c r4:855f2d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85563000 r8:855f2dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855f2d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855f2d80 r8:8027f5e8 r7:eb801e60 r6:855f2e00 r5:85563000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb811fb0 to 0xeb811ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:855fb900 INFO: task kworker/1:663:5209 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: c11b3000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb691000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:855cdb8c r4:855f2e80 Exception stack(0xeb815fb0 to 0xeb815ff8) task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: c11b3000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:665:5215 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:665 state:D stack:0 pid:5215 tgid:5215 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:85564800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb81de08 r5:00001000 r4:eb827000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:855fbd40 Call trace: Exception stack(0xe47b9d28 to 0xe47b9d70) r4:82ac11a4 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:85565400 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 r5:00001000 r4:eb6c9000 r7:ddde2d80 r6:83018200 r5:855cdf8c r4:85609080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85609080 r8:8027f5e8 r7:eb81de60 r6:85609100 r5:85565400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7f9fb0 to 0xeb7f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:855fbd40 INFO: task kworker/1:666:5216 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: c184f000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:85566000 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 r5:00001000 r4:eb83f000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 9d60: 80230ad4 80239bb0 80070013 ffffffff [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 Not tainted 6.15.0-syzkaller #0 r4:85566c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb831e08 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8560f040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85566c00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb833000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855ce78c r4:855ce400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855ce78c r4:85609280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85566c00 r8:856092ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85609280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85609280 r8:8027f5e8 r7:eb825e60 r6:85609300 r5:85566c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb831fb0 to 0xeb831ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8560f080 INFO: task kworker/1:668:5220 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: c1b2b000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb83de08 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85609380 r8:8027f5e8 r7:eb825e60 r6:85609400 r5:85561800 task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11a4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:670:5225 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:670 state:D stack:0 pid:5225 tgid:5225 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb855d84 r8:00000002 r7:60000113 r6:eb855d8c r5:8555b000 r4:8555b000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8555b000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb855e08 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb857000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:855cf38c r4:855cf000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:670:5225 is blocked on a mutex likely owned by task kworker/1:171:3869. 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb861e08 r5:00001000 r4:eb863000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855cf78c r4:855cf400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855cf78c r4:85609580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8555d400 r8:856095ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85609580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85609580 r8:8027f5e8 r7:eb855e60 r6:85609600 r5:8555d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb861fb0 to 0xeb861ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8560f440 INFO: task kworker/1:671:5227 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: c236e000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:672:5228 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:672 state:D stack:0 pid:5228 tgid:5228 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb849d84 r8:00000002 r7:60000113 r6:eb849d8c r5:85620000 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:85620000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 r5:00001000 r4:eb86f000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb849fb0 to 0xeb849ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8560f5c0 INFO: task kworker/1:672:5228 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: c25f3000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:673:5230 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:673 state:D stack:0 pid:5230 tgid:5230 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb86dd84 r8:00000002 r7:60000013 r6:eb86dd8c r5:85620c00 r4:85620c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85620c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8559b300 r5:00001000 r4:dfa53000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb86dfb0 to 0xeb86dff8) task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11a4 r4:00000000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:674:5231 blocked for more than 465 seconds. r10:8291880c r9:eb885d84 r8:00000002 r7:60000113 r6:eb885d8c r5:85622400 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:eb87b000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xeb885fb0 to 0xeb885ff8) task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11a4 r4:00000000 r5:85a7af8c r4:85a7ac00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:376:5234 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:376 state:D stack:0 pid:5234 tgid:5234 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb895d84 r8:00000002 r7:60000113 r6:eb895d8c r5:85621800 r4:85621800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85621800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb895e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8561a380 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85621800 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe7b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855d8b8c r4:855d8800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855d8b8c r4:854aca00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85621800 r8:854aca2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854aca00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854aca00 r8:8027f5e8 r7:eb7f5e60 r6:85609980 r5:85621800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb895fb0 to 0xeb895ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:675:5235 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:675 state:D stack:0 pid:5235 tgid:5235 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb891d84 r8:00000002 r7:60000113 r6:eb891d8c r5:85623c00 r4:85623c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85623c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb891e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8560ff00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85623c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb897000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855d838c r4:855d8000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855d838c r4:85609a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85623c00 r8:85609a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85609a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85609a00 r8:8027f5e8 r7:eb86de60 r6:85609a80 r5:85623c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb891fb0 to 0xeb891ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8560fc40 INFO: task kworker/1:675:5235 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: c2e26000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe47b9fb0 to 0xe47b9ff8) INFO: task kworker/1:676:5237 blocked for more than 465 seconds. [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r4:00000000 r5:00001000 r4:e0701000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:855d8f8c r4:85609b00 Exception stack(0xeb7c1fb0 to 0xeb7c1ff8) task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:377 state:D stack:0 pid:5241 tgid:5241 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:eb361000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xeb8adfb0 to 0xeb8adff8) Workqueue: events bpf_prog_free_deferred Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: c3655000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:677:5243 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:677 state:D stack:0 pid:5243 tgid:5243 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb8a9d84 r8:00000002 r7:60000013 r6:eb8a9d8c r5:85624800 r4:85624800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85624800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8a9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8561a7c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85624800 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea951000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855d938c r4:855d9000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85609c80 r8:8027f5e8 r7:eb7c1e60 r6:85609d00 r5:85624800 task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 9d60: 80230ad4 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eac4d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:855d978c r4:85609d80 r10:00000000 r9:85609d80 r8:8027f5e8 r7:eb8a9e60 r6:85609e00 r5:85626c00 task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: c39ca000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:679:5247 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:679 state:D stack:0 pid:5247 tgid:5247 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb8a1d84 r8:00000002 r7:60000013 r6:eb8a1d8c r5:85625400 r4:85625400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85625400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8a1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r9:83018205 r8:85625400 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 r5:00001000 r4:ead73000 r7:ddde2d80 r6:83018200 r5:855d9f8c r4:85609e80 1fa0: 00000000 00000000 00000000 00000000 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:680:5249 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:680 state:D stack:0 pid:5249 tgid:5249 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb8b1d84 r8:00000002 r7:60000113 r6:eb8b1d8c r5:85628000 r4:85628000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85628000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8b1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8561aac0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85628000 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead09000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855d9b8c r4:855d9800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855d9b8c r4:85609f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85628000 r8:85609fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85609f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11a4 r4:00000000 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8b5e08 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8561ad80 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85628c00 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae7d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855da38c r4:855da000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855da38c r4:85615080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85628c00 r8:856150ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85615080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85615080 r8:8027f5e8 r7:eb8a1e60 r6:85615100 r5:85628c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8b5fb0 to 0xeb8b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8561aa80 INFO: task kworker/1:681:5251 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: c3f4a000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r4:00000000 r5:00001000 r4:eb1d5000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:8561ab80 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8bde08 r5:00001000 r4:eb105000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:855da78c r4:85615280 Exception stack(0xeb8bdfb0 to 0xeb8bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8561ae80 INFO: task kworker/1:683:5255 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: c4678000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:eb17b000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8562bc00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8c5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8565d300 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8562bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 r5:00001000 r4:eb283000 r10:00000000 r9:85615480 r8:8027f5e8 r7:eb8b9e60 r6:85615500 r5:8562bc00 Workqueue: events bpf_prog_free_deferred 9d20: c49a9000 e8845000 00000001 80239b98 7f1c9000 00000001 r4:e47b9dc0 r5:00001000 r4:ece91000 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eb229000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8565d240 INFO: task kworker/1:686:5261 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: c49a9000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8d1e08 r9:83018205 r8:8562e000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r5:00001000 r4:eb3d7000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855dbf8c r4:85615680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8562e000 r8:856156ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85615680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85615680 r8:8027f5e8 r7:eb8c5e60 r6:85615700 r5:8562e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8d1fb0 to 0xeb8d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8565d180 INFO: task kworker/1:687:5263 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: c4f18000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85a7af8c r4:85a7ac00 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:8562d400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8d9e08 r5:00001000 r4:eb711000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xeb8d9fb0 to 0xeb8d9ff8) Call trace: r5:80070013 r4:80239bb0 r5:00001000 r4:ece91000 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:688:5267 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:688 state:D stack:0 pid:5267 tgid:5267 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb8d5d84 r8:00000002 r7:60000013 r6:eb8d5d8c r5:85630000 r4:85630000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85630000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8d5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8565d780 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85630000 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3b8000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855dbb8c r4:855db800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855dbb8c r4:85615800 r10:00000000 r9:85615800 r8:8027f5e8 r7:eb8d1e60 r6:85615880 r5:85630000 r4:8565d600 Call trace: 9d20: c5247000 e8845000 00000001 80239b98 7f1c9000 00000001 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eb411000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8569878c r4:85615900 Exception stack(0xeb8cdfb0 to 0xeb8cdff8) task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11a4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:690:5271 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:690 state:D stack:0 pid:5271 tgid:5271 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb8e1d84 r8:00000002 r7:60000013 r6:eb8e1d8c r5:85632400 r4:85632400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85632400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8e1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8565da00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85632400 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3f3000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8569838c r4:85698000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8569838c r4:85615a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85632400 r8:85615a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r5:00001000 r4:ece91000 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:8291880c r9:eb8e5d84 r8:00000002 r7:60000013 r6:eb8e5d8c r5:85633c00 r5:00001000 r4:eb5a1000 r7:ddde2d80 r6:83018200 r5:85698b8c r4:85615b00 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:82ac11a4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:692:5275 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:692 state:D stack:0 pid:5275 tgid:5275 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb8e9d84 r8:00000002 r7:60000013 r6:eb8e9d8c r5:85634800 r4:85634800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85634800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8e9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d4b540 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85634800 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb58f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854e2b8c r4:854e2800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854e2b8c r4:85615c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85634800 r8:85615c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85615c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85615c00 r8:8027f5e8 r7:eb8e5e60 r6:85615c80 r5:85634800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8e9fb0 to 0xeb8e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8565dd40 INFO: task kworker/1:692:5275 is blocked on a mutex likely owned by task kworker/1:171:3869. Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: c5bef000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:8291880c r9:eb8ddd84 r8:00000002 r7:60000013 r6:eb8ddd8c r5:85635400 r5:00001000 r4:eb725000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85698f8c r4:85698c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85698f8c r4:85615d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85635400 r8:85615d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8565de80 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85660bc0 r5:00001000 r4:eb793000 r10:61c88647 r9:85636000 r8:85615e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Workqueue: events bpf_prog_free_deferred r4:82ac11a4 r5:00001000 r4:ece91000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:379:5281 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:379 state:D stack:0 pid:5281 tgid:5281 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb8f9d84 r8:00000002 r7:60000113 r6:eb8f9d8c r5:85631800 r4:85631800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85631800 r4:82918808 [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856652c0 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:854e338c r4:854acb80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85631800 r8:854acbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854acb80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854acb80 r8:8027f5e8 r7:eb7f5e60 r6:85615f00 r5:85631800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8f9fb0 to 0xeb8f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85665080 INFO: task kworker/0:379:5281 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r5:80070013 r4:80239bb0 r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 Call trace: r4:00000000 r5:00001000 r4:eb763000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8569938c r4:85615f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85636c00 r8:85615fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85615f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85615f80 r8:8027f5e8 r7:eb8f5e60 r6:8565c000 r5:85636c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8fdfb0 to 0xeb8fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856602c0 INFO: task kworker/1:695:5282 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: c654f000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eb771000 r7:dddced80 r6:83018000 r5:854e378c r4:854acc00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe47b9d28 to 0xe47b9d70) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 task:kworker/0:381 state:D stack:0 pid:5287 tgid:5287 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb90dd84 r8:00000002 r7:60000113 r6:eb90dd8c r5:8563a400 r4:8563a400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8563a400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb90de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85665540 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8563a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb973000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854e3b8c r4:854e3800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854e3b8c r4:854acc80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8563a400 r8:854accac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854acc80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854acc80 r8:8027f5e8 r7:eb7f5e60 r6:8565c100 r5:8563a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb90dfb0 to 0xeb90dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85665280 INFO: task kworker/0:381:5287 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 9d20: c69f6000 e8845000 00000001 80239b98 7f1c9000 00000001 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:00000000 r5:00001000 r4:eb77f000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:82ac11a4 r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb915e08 r5:00001000 r4:eb7c3000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8563bc00 r8:8565c2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e47b9dc0 r5:00001000 r4:ece91000 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7a1000 r7:ddde2d80 r6:83018200 r5:85699f8c r4:8565c380 Exception stack(0xeb919fb0 to 0xeb919ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85660c40 INFO: task kworker/1:698:5293 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: c7001000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:699:5295 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:699 state:D stack:0 pid:5295 tgid:5295 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb91dd84 r8:00000002 r7:60000113 r6:eb91dd8c r5:8563d400 r4:8563d400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r4:00000000 r4:00000000 r5:00001000 r4:eb7af000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8569a38c r4:8565c480 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: c74ad000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:8454d780 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85658140 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:8565c580 r8:8027f5e8 r7:eb915e60 r6:8565c600 r5:8563e000 r4:e47b9dc0 r5:85a7af8c r4:85a7ac00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb929e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85658900 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85639800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb947000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8569b78c r4:8569b400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8569b78c r4:8565c680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85639800 r8:8565c6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8565c680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8565c680 r8:8027f5e8 r7:eb921e60 r6:8565c700 r5:85639800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb929fb0 to 0xeb929ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85658100 INFO: task kworker/1:701:5299 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:702:5301 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:702 state:D stack:0 pid:5301 tgid:5301 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb935d84 r8:00000002 r7:60000013 r6:eb935d8c r5:85638000 r4:85638000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85638000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb935e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85658400 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85638000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb92b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb935fb0 to 0xeb935ff8) task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 r4:00000000 r5:00001000 r4:eb93b000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r5:00001000 r4:ece91000 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e5a340 task:kworker/1:704 state:D stack:0 pid:5304 tgid:5304 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb967000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85640c00 r8:8565c9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8565c980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8565c980 r8:8027f5e8 r7:eb929e60 r6:8565ca00 r5:85640c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb945fb0 to 0xeb945ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85658580 INFO: task kworker/1:704:5304 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: c7f1b000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/1:705 state:D stack:0 pid:5306 tgid:5306 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:eb953000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85658780 INFO: task kworker/1:705:5306 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: c83db000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85a7af8c r4:85a7ac00 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:706 state:D stack:0 pid:5308 tgid:5308 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:eb95f000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:82ac11a4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:dfabf000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb909fb0 to 0xeb909ff8) r4:85658c40 INFO: task kworker/1:707:5310 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: c874e000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:382:5313 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:382 state:D stack:0 pid:5313 tgid:5313 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb8edd84 r8:00000002 r7:60000113 r6:eb8edd8c r5:84d02400 r4:84d02400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d02400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:e47a7000 r5:84c3878c r4:84c38400 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:82ac11a4 r5:85a7af8c r4:85a7ac00 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8561d300 r5:00001000 r4:dff8b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856a8b8c r4:856a8800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856a8b8c r4:8565cd80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d03c00 r8:8565cdac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8565cd80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8565cd80 r8:8027f5e8 r7:eb909e60 r6:854ace00 r5:84d03c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8f1fb0 to 0xeb8f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8561d200 INFO: task kworker/1:708:5315 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) 9d20: c8aa7000 e8845000 00000001 80239b98 7f1c9000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:709:5317 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:709 state:D stack:0 pid:5317 tgid:5317 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb821d84 r8:00000002 r7:60000013 r6:eb821d8c r5:85644800 r4:85644800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85644800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb821e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8561de00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85644800 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf0d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856a978c r4:856a9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856a978c r4:8565ce00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85644800 r8:8565ce2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:85643c00 r4:00000000 r5:00001000 r4:eab57000 Exception stack(0xeb839fb0 to 0xeb839ff8) 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8561d880 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85646000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa8b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856a8f8c r4:856a8c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856a8f8c r4:854ace80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85646000 r8:854aceac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854ace80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ace80 r8:8027f5e8 r7:eb7f5e60 r6:8560d000 r5:85646000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb85dfb0 to 0xeb85dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85665680 INFO: task kworker/0:383:5322 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: c9346000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 r5:85a7af8c r4:85a7ac00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Call trace: [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r4:00000000 r5:00001000 r4:eb9d3000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854e878c r4:854e8400 r7:dddced80 r6:83018000 r5:854e878c r4:854acf00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85646c00 r8:854acf2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854acf00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854acf00 r8:8027f5e8 r7:eb85de60 r6:8560d080 r5:85646c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb875fb0 to 0xeb875ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85665680 INFO: task kworker/0:384:5323 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: c9346000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:385:5325 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:385 state:D stack:0 pid:5325 tgid:5325 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb881d84 r8:00000002 r7:60000113 r6:eb881d8c r5:85643000 r4:85643000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85643000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb881e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85665ac0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb0f9000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84237b8c r4:84237800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84237b8c r4:854acf80 r10:61c88647 r9:85643000 r8:854acfac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeb881fb0 to 0xeb881ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: c963f000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:711:5328 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:711 state:D stack:0 pid:5328 tgid:5328 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb88dd84 r8:00000002 r7:60000113 r6:eb88dd8c r5:85648c00 r4:85648c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85648c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb88de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8561df40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85648c00 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb05d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856a9b8c r4:856a9800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856a9b8c r4:8560d180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85648c00 r8:8560d1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8560d180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8560d180 r8:8027f5e8 r7:eb821e60 r6:8560d200 r5:85648c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb88dfb0 to 0xeb88dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8561dc80 INFO: task kworker/1:711:5328 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: c9b44000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:712:5330 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Call trace: r10:8291880c r9:eb89dd84 r8:00000002 r7:60000013 r6:eb89dd8c r5:8564a400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb89de08 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8561dc00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8564a400 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0b9000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856a9f8c r4:856a9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856a9f8c r4:8560d280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8564a400 r8:8560d2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8560d280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8560d280 r8:8027f5e8 r7:eb88de60 r6:8560d300 r5:8564a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb89dfb0 to 0xeb89dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8561d940 INFO: task kworker/1:712:5330 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: c9b44000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8454d780 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eb353000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:856aa38c r4:8560d380 r4:00000001 r4:8561d700 Workqueue: events bpf_prog_free_deferred 9d60: 80230ad4 80239bb0 80070013 ffffffff r4:00000000 r5:85a7af8c r4:85a7ac00 r4:00000001 r4:84e5a340 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb989e08 r5:00001000 r4:eb871000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:85617000 9fa0: 00000000 00000000 00000000 00000000 r4:85665940 INFO: task kworker/0:386:5334 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: c9ec2000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Not tainted 6.15.0-syzkaller #0 r4:8564bc00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb98de08 r5:00001000 r4:eb455000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e47b9dc0 r5:00001000 r4:ece91000 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:8564c800 r4:82918808 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:eb431000 r7:ddde2d80 r6:83018200 r5:856aa78c r4:8560d600 Exception stack(0xeb991fb0 to 0xeb991ff8) task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:716:5341 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:716 state:D stack:0 pid:5341 tgid:5341 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb985d84 r8:00000002 r7:60000113 r6:eb985d8c r5:8564d400 r4:8564d400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8564d400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb985e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856057c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8564d400 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4a3000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856aaf8c r4:856aac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856aaf8c r4:8560d700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8564d400 r8:8560d72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8560d700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8560d700 r8:8027f5e8 r7:eb98de60 r6:8560d780 r5:8564d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb985fb0 to 0xeb985ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11a4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:717 state:D stack:0 pid:5342 tgid:5342 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb82dd84 r8:00000002 r7:60000113 r6:eb82dd8c r5:8564e000 r4:8564e000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8564e000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb82de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85605980 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8564e000 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4e5000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856ab38c r4:856ab000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856ab38c r4:8560d800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8564e000 r8:8560d82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8560d800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8560d800 r8:8027f5e8 r7:eb985e60 r6:8560d880 r5:8564e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb82dfb0 to 0xeb82dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85605540 INFO: task kworker/1:717:5342 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: cb181000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe47b9fb0 to 0xe47b9ff8) Not tainted 6.15.0-syzkaller #0 r10:8291880c r9:eb995d84 r8:00000002 r7:60000113 r6:eb995d8c r5:8564ec00 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:eb52d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:856ab78c r4:8560d900 Exception stack(0xeb995fb0 to 0xeb995ff8) r4:856058c0 task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: cb181000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85649800 r4:00000000 r4:00000000 r5:00001000 r4:eb541000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856abb8c r4:856ab800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856abb8c r4:8560da00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85649800 r8:8560da2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8560da00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8560da00 r8:8027f5e8 r7:eb995e60 r6:8560da80 r5:85649800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb999fb0 to 0xeb999ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85605900 INFO: task kworker/1:719:5346 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: cb181000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 r5:85a7af8c r4:85a7ac00 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e5a340 r10:8291880c r9:eb9a5d84 r8:00000002 r7:60000013 r6:eb9a5d8c r5:8563ec00 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85658f80 r5:00001000 r4:eb649000 r5:856b478c r4:856b4400 r7:ddde2d80 r6:83018200 r5:856b478c r4:8560db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8563ec00 r8:8560db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8560db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8560db00 r8:8027f5e8 r7:eb999e60 r6:85617080 r5:8563ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9a5fb0 to 0xeb9a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85605ac0 INFO: task kworker/1:720:5348 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: cbafd000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 r4:00000000 r5:85a7af8c r4:85a7ac00 r4:8454d780 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9a9e08 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5df000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84d06000 r8:8560dbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85605ac0 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e47b9dc0 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe47b9fb0 to 0xe47b9ff8) Not tainted 6.15.0-syzkaller #0 r4:84d05400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9b1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85605f80 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84d05400 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5fb000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856b438c r4:856b4000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856b438c r4:8560dc00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d05400 r8:8560dc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8560dc00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8560dc00 r8:8027f5e8 r7:eb9a5e60 r6:85617180 r5:84d05400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9b1fb0 to 0xeb9b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85605e40 INFO: task kworker/1:722:5351 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: cbafd000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9b9e08 r5:00001000 r4:eb6a5000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8560dc80 r8:8027f5e8 r7:eb9a5e60 r6:85617200 r5:84d04800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9b9fb0 to 0xeb9b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85658e40 INFO: task kworker/1:723:5354 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: cc331000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8565d680 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84d06c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb66d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856b4b8c r4:856b4800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856b4b8c r4:8560dd00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d06c00 r8:8560dd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8560dd00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8560dd00 r8:8027f5e8 r7:eb9b9e60 r6:85617280 r5:84d06c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9bdfb0 to 0xeb9bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85605000 INFO: task kworker/1:724:5355 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: cc331000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 r4:e47b9dc0 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Call trace: r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85608300 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85608040 task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: cc42a000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:eb817000 r10:00000000 r9:8560de80 r8:8027f5e8 r7:eb99de60 r6:8560df00 r5:85650c00 r4:e47b9dc0 r4:8454d780 task:kworker/1:727 state:D stack:0 pid:5362 tgid:5362 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:eb9cb000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9adfb0 to 0xeb9adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85608640 INFO: task kworker/1:727:5362 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d60: 80230ad4 80239bb0 80070013 ffffffff r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000000 r5:00001000 r4:eb841000 r5:856b5b8c r4:856b5800 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 Exception stack(0xe47b9fb0 to 0xe47b9ff8) r10:8291880c r9:eb9c5d84 r8:00000002 r7:60000113 r6:eb9c5d8c r5:85653c00 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85608b40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85653c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9df000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856b638c r4:856b6000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856b638c r4:8561e180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85653c00 r8:8561e1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8561e180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561e180 r8:8027f5e8 r7:eb9ade60 r6:85617300 r5:85653c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9c5fb0 to 0xeb9c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856087c0 INFO: task kworker/1:729:5366 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: ccffd000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:00001000 r4:ece91000 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:eba87000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85617380 r8:8027f5e8 r7:eb875e60 r6:85617400 r5:84d01800 task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:8291880c r9:eb9e9d84 r8:00000002 r7:60000013 r6:eb9e9d8c r5:84d00000 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:eb9fb000 r5:856b6b8c r4:856b6800 r4:8561e200 9fa0: 00000000 00000000 00000000 00000000 [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: cd650000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:731:5372 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:731 state:D stack:0 pid:5372 tgid:5372 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb9edd84 r8:00000002 r7:60000113 r6:eb9edd8c r5:84d03000 r4:84d03000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d03000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9ede08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85608d80 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84d03000 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9ef000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856b678c r4:856b6400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856b678c r4:8561e280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d03000 r8:8561e2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8561e280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561e280 r8:8027f5e8 r7:eb9e9e60 r6:85617500 r5:84d03000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9edfb0 to 0xeb9edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e5a340 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856b6f8c r4:856b6c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856b6f8c r4:8561e300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8550d400 r8:8561e32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8561e300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561e300 r8:8027f5e8 r7:eb9e9e60 r6:85617580 r5:8550d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba09fb0 to 0xeba09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85608cc0 INFO: task kworker/1:732:5375 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: ce314000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba7f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84c60000 r8:8561762c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85659380 [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r4:84e5a340 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba1de08 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 9d20: ce9f4000 e8845000 00000001 80239b98 7f1c9000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:734:5379 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:734 state:D stack:0 pid:5379 tgid:5379 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eba29d84 r8:00000002 r7:60000013 r6:eba29d8c r5:84c62400 r4:84c62400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c62400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba29e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85605f00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84c62400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba1f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856b738c r4:856b7000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856b738c r4:8561e400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c62400 r8:8561e42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8561e400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561e400 r8:8027f5e8 r7:eba1de60 r6:85617780 r5:84c62400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba29fb0 to 0xeba29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85608e00 INFO: task kworker/1:734:5379 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: ce9f4000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:735:5381 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:735 state:D stack:0 pid:5381 tgid:5381 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eba39d84 r8:00000002 r7:60000113 r6:eba39d8c r5:84c60c00 r4:84c60c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c60c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba39e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856140c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84c60c00 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba2f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:856b778c r4:856b7400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e47b9dc0 r5:00001000 r4:ece91000 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:eba3f000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8561e480 r8:8027f5e8 r7:eba1de60 r6:8561e580 r5:85652400 Workqueue: events bpf_prog_free_deferred 9d20: cf19b000 e8845000 00000001 80239b98 7f1c9000 00000001 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:737:5385 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:737 state:D stack:0 pid:5385 tgid:5385 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eba49d84 r8:00000002 r7:60000013 r6:eba49d8c r5:85655400 r4:85655400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85655400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba49e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85614480 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85655400 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba4b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856b7f8c r4:856b7c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856b7f8c r4:8561e600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85655400 r8:8561e62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8561e600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561e600 r8:8027f5e8 r7:eba1de60 r6:8561e680 r5:85655400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba49fb0 to 0xeba49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85614140 INFO: task kworker/1:737:5385 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 9d20: cf5f3000 e8845000 00000001 80239b98 7f1c9000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:eba63000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: cfe3c000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85667d80 r5:00001000 r4:dfd2d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:856ba38c r4:8561e800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba61fb0 to 0xeba61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85614580 INFO: task kworker/1:739:5390 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: d0351000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:eba73000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:82ac11a4 r4:00000000 r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 r4:00000001 r4:84e5a340 task:kworker/0:389 state:D stack:0 pid:5394 tgid:5394 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r9:83018005 r8:856d0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c9000 r5:00001000 r4:ebaa7000 r7:dddced80 r6:83018000 r5:854e978c r4:85617880 5fa0: 00000000 00000000 00000000 00000000 [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11a4 r4:00000000 r5:85a7af8c r4:85a7ac00 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:741:5396 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:741 state:D stack:0 pid:5396 tgid:5396 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eba99d84 r8:00000002 r7:60000013 r6:eba99d8c r5:856d1800 r4:856d1800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856d1800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba99e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85659b00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856d1800 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba9b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854e938c r4:854e9000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854e938c r4:8561ea80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856d1800 r8:8561eaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8561ea80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561ea80 r8:8027f5e8 r7:eba61e60 r6:8561eb00 r5:856d1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba99fb0 to 0xeba99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85614a40 INFO: task kworker/1:741:5396 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: d117d000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856d0000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85659380 r5:00001000 r4:ebab3000 r7:ddde2d80 r6:83018200 r5:854e9b8c r4:8561eb80 Exception stack(0xebaa5fb0 to 0xebaa5ff8) task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11a4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r5:85a7af8c r4:85a7ac00 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:390:5400 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:390 state:D stack:0 pid:5400 tgid:5400 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ebabdd84 r8:00000002 r7:60000113 r6:ebabdd8c r5:856d2400 r4:856d2400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856d2400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebabde08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85683ec0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856d2400 r7:00000000 r6:83018000 r5:00001000 r4:7f0df000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec435000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854ebf8c r4:854ebc00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854ebf8c r4:85617900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856d2400 r8:8561792c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85617900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85617900 r8:8027f5e8 r7:eba95e60 r6:8561ec80 r5:856d2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebabdfb0 to 0xebabdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85659bc0 INFO: task kworker/0:390:5400 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: d117d000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 r5:00001000 r4:ece91000 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:856d3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 r5:00001000 r4:ebaeb000 r7:dddced80 r6:83018000 r5:854e9f8c r4:85617980 r10:00000000 r9:85617980 r8:8027f5e8 r7:ebabde60 r6:8561ed00 r5:856d3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebab1fb0 to 0xebab1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85659bc0 INFO: task kworker/0:391:5401 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: d117d000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ebac7000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:856b8f8c r4:856b8c00 r4:8561ed80 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d20: d17ac000 e8845000 00000001 80239b98 7f1c9000 00000001 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8454d780 Exception stack(0xe47b9fb0 to 0xe47b9ff8) Not tainted 6.15.0-syzkaller #0 r10:8291880c r9:ebad9d84 r8:00000002 r7:60000013 r6:ebad9d8c r5:856d6000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85667040 r5:00001000 r4:ebacf000 r5:856b938c r4:856b9000 r10:61c88647 r9:856d6000 r8:8561eeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: d202a000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:745:5407 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:745 state:D stack:0 pid:5407 tgid:5407 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ebae9d84 r8:00000002 r7:60000013 r6:ebae9d8c r5:856d6c00 r4:856d6c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856d6c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebae9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85667100 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebadb000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:856b978c r4:8561ef80 9fa0: 00000000 00000000 00000000 00000000 r4:00000000 9d60: 80230ad4 80239bb0 80070013 ffffffff r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e5a340 task:kworker/1:746 state:D stack:0 pid:5409 tgid:5409 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85667a00 r5:00001000 r4:dfa5f000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8565f080 r8:8027f5e8 r7:eba61e60 r6:8565f100 r5:85645400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb01fb0 to 0xebb01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85667500 INFO: task kworker/1:746:5409 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: d2159000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ebaf3000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 r5:00001000 r4:ece91000 r4:8454d780 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8565eb80 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856d9800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb73000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854eab8c r4:854ea800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854eab8c r4:85617a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856d9800 r8:85617aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85617a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85617a80 r8:8027f5e8 r7:ebabde60 r6:8565f200 r5:856d9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb15fb0 to 0xebb15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85614e40 INFO: task kworker/0:393:5412 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: d2dbd000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:00001000 r4:ece91000 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8291880c r9:eb8a5d84 r8:00000002 r7:60000013 r6:eb8a5d8c r5:856d8c00 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:dfacb000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 9d60: 80230ad4 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:856dbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 r5:00001000 r4:ea90d000 r7:ddde2d80 r6:83018200 r5:856bab8c r4:8565f380 r10:00000000 r9:8565f380 r8:8027f5e8 r7:eba61e60 r6:8565f400 r5:856dbc00 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85667d00 INFO: task kworker/1:748:5418 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: d3353000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:749:5420 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:749 state:D stack:0 pid:5420 tgid:5420 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb931d84 r8:00000002 r7:60000113 r6:eb931d8c r5:856db000 r4:856db000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856db000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb931e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85667e40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856db000 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06c1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856ba78c r4:856ba400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856ba78c r4:8565f480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856db000 r8:8565f4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8565f480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8565f480 r8:8027f5e8 r7:ebb11e60 r6:8565f500 r5:856db000 Exception stack(0xeb931fb0 to 0xeb931ff8) task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11a4 r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 r4:8454d780 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: r5:856dd400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb941e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856073c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856dd400 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae61000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856bb38c r4:856bb000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856bb38c r4:8565f580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856dd400 r8:8565f5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8565f580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8565f580 r8:8027f5e8 r7:ebb11e60 r6:8565f600 r5:856dd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb941fb0 to 0xeb941ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85667f80 INFO: task kworker/1:750:5422 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: d3a19000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:8291880c r9:eb94dd84 r8:00000002 r7:60000113 r6:eb94dd8c r5:856de000 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ead3d000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:85659280 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:82ac11a4 r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:752 state:D stack:0 pid:5425 tgid:5425 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb119000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856bb78c r4:8565f780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c63c00 r8:8565f7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8565f780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8565f780 r8:8027f5e8 r7:eb941e60 r6:85617b00 r5:84c63c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba7dfb0 to 0xeba7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856070c0 INFO: task kworker/1:752:5425 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: d3a19000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:753:5429 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 r10:8291880c r9:eb971d84 r8:00000002 r7:60000113 r6:eb971d8c r5:84c64800 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb199000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:856bbb8c r4:8565f800 Exception stack(0xeb971fb0 to 0xeb971ff8) task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11a4 r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 r4:8454d780 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:754 state:D stack:0 pid:5431 tgid:5431 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb19e08 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85607880 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84c66c00 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb28d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856c838c r4:856c8000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856c838c r4:8565f880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c66c00 r8:8565f8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8565f880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8565f880 r8:8027f5e8 r7:eb971e60 r6:85617c00 r5:84c66c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb19fb0 to 0xebb19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85607300 INFO: task kworker/1:754:5431 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: d43b9000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb1de08 r5:00001000 r4:eb219000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84c65400 r8:8565f92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:756:5435 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:756 state:D stack:0 pid:5435 tgid:5435 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ebb25d84 r8:00000002 r7:60000013 r6:ebb25d8c r5:8550bc00 r4:8550bc00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb38b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: d486a000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/1:757 state:D stack:0 pid:5437 tgid:5437 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb29e08 r5:00001000 r4:eb3cb000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:757:5437 is blocked on a mutex likely owned by task kworker/1:171:3869. 9d60: 80230ad4 80239bb0 80070013 ffffffff r4:00000000 r5:85a7af8c r4:85a7ac00 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r10:8291880c r9:ebb2dd84 r8:00000002 r7:60000113 r6:ebb2dd8c r5:84c66000 r4:84c66000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c66000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb2de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85607cc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84c66000 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3f7000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856c8f8c r4:856c8c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856c8f8c r4:8565fa80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c66000 r8:8565faac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8565fa80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8565fa80 r8:8027f5e8 r7:ebb29e60 r6:85617e00 r5:84c66000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb2dfb0 to 0xebb2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85607800 INFO: task kworker/1:758:5439 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:8562ec00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8562ec00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb31e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856677c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8562ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb717000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856c9b8c r4:856c9800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856c9b8c r4:8565fb00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8562ec00 r8:8565fb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8565fb00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8565fb00 r8:8027f5e8 r7:ebb2de60 r6:85617e80 r5:8562ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb31fb0 to 0xebb31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85607ac0 INFO: task kworker/1:759:5441 is blocked on a mutex likely owned by task kworker/1:171:3869. Exception stack(0xe47b9d28 to 0xe47b9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:8454d780 Exception stack(0xe47b9fb0 to 0xe47b9ff8) INFO: task kworker/1:760:5442 blocked for more than 467 seconds. r4:856dc800 r4:00000000 r4:00000000 r5:00001000 r4:eb555000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:856dc800 r8:8565fbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 r4:00000000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:761:5444 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:761 state:D stack:0 pid:5444 tgid:5444 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ebb21d84 r8:00000002 r7:60000113 r6:ebb21d8c r5:856dec00 r4:856dec00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856dec00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb21e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85607fc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856dec00 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb59f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856c978c r4:856c9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856c978c r4:8565fc80 r10:61c88647 r9:856dec00 r8:8565fcac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:82ac11a4 r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe47b9fb0 to 0xe47b9ff8) INFO: task kworker/1:762:5448 blocked for more than 467 seconds. r4:856d5400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9f9e08 r5:00001000 r4:eb75b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856ca38c r4:856ca000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856ca38c r4:8565fd80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856d5400 r8:8565fdac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8565fd80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8565fd80 r8:8027f5e8 r7:ebb31e60 r6:8565fe00 r5:856d5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9f9fb0 to 0xeb9f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85663080 INFO: task kworker/1:762:5448 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: d5930000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:85a7af8c r4:85a7ac00 r4:8454d780 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:763:5449 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:763 state:D stack:0 pid:5449 tgid:5449 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ebb41d84 r8:00000002 r7:60000013 r6:ebb41d8c r5:856d4800 r4:856d4800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856d4800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb41e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85663040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856d4800 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb74b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856c9f8c r4:856c9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856c9f8c r4:8565fe80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856d4800 r8:8565feac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8565fe80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8565fe80 r8:8027f5e8 r7:eb9f9e60 r6:8565ff00 r5:856d4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb41fb0 to 0xebb41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85663240 INFO: task kworker/1:763:5449 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: d5930000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r5:85a7af8c r4:85a7ac00 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eb773000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:856da400 r8:8565ffac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe47b9d28 to 0xe47b9d70) r4:82ac11a4 r5:00001000 r4:ece91000 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb45e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856636c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856e0000 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb789000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856cab8c r4:856ca800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856cab8c r4:8566f080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856e0000 r8:8566f0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8566f080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8566f080 r8:8027f5e8 r7:ebb3de60 r6:8566f100 r5:856e0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb45fb0 to 0xebb45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85663440 INFO: task kworker/1:765:5453 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: d5c0d000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856e0c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb49e08 r5:00001000 r4:eb7c7000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:856e0c00 r8:8566f1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eb79f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xebb4dfb0 to 0xebb4dff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85663640 INFO: task kworker/1:767:5456 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: d6aea000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:768:5459 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:768 state:D stack:0 pid:5459 tgid:5459 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ebb51d84 r8:00000002 r7:60000013 r6:ebb51d8c r5:856e2400 r4:856e2400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856e2400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb51e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85663980 r4:00000000 r5:00001000 r4:eb7b7000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8566f380 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:82ac11a4 r4:00000000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856e3c00 r4:00000000 r9:83018205 r8:856e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xebb55fb0 to 0xebb55ff8) task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11a4 r4:00000000 r5:85a7af8c r4:85a7ac00 r4:8454d780 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:770:5463 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:770 state:D stack:0 pid:5463 tgid:5463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ebb61d84 r8:00000002 r7:60000013 r6:ebb61d8c r5:856e4800 r4:856e4800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856e4800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb61e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85663fc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856e4800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb969000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8574838c r4:85748000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8574838c r4:8566f580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856e4800 r8:8566f5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8566f580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8566f580 r8:8027f5e8 r7:ebb55e60 r6:8566f600 r5:856e4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb61fb0 to 0xebb61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85663940 INFO: task kworker/1:770:5463 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 Exception stack(0xe47b9d28 to 0xe47b9d70) r4:e47b9dc0 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 Not tainted 6.15.0-syzkaller #0 r4:856e6000 r4:00000000 r9:83018205 r8:856e6000 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 r5:00001000 r4:eb955000 r7:ddde2d80 r6:83018200 r5:856cbf8c r4:8566f680 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:82ac11a4 r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e5a340 Workqueue: events bpf_prog_free_deferred [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:ebb39000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8566f780 r8:8027f5e8 r7:ebb61e60 r6:8566f800 r5:856e6c00 task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: d7482000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:773:5470 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:773 state:D stack:0 pid:5470 tgid:5470 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec385d84 r8:00000002 r7:60000013 r6:ec385d8c r5:856e8c00 r4:856e8c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856e8c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec385e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8567d480 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856e8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec381000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85748b8c r4:85748800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85748b8c r4:8566f880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856e8c00 r8:8566f8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8566f880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8566f880 r8:8027f5e8 r7:ebb71e60 r6:8566f900 r5:856e8c00 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r5:85a7af8c r4:85a7ac00 r4:8454d780 Exception stack(0xe47b9fb0 to 0xe47b9ff8) Not tainted 6.15.0-syzkaller #0 r4:84512400 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ec399000 r5:8574938c r4:85749000 r4:8566f980 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: d79ff000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:775:5475 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 task:kworker/1:775 state:D stack:0 pid:5475 tgid:5475 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r9:83018205 r8:84510000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 r5:00001000 r4:ec38d000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xec3b1fb0 to 0xec3b1ff8) task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec3cd000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85749f8c r4:8566fa80 Exception stack(0xec3bdfb0 to 0xec3bdff8) Workqueue: events bpf_prog_free_deferred 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 r4:00000000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84515400 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ec3e9000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854eaf8c r4:854eac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854eaf8c r4:85682000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84515400 r8:8568202c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85682000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85682000 r8:8027f5e8 r7:ebabde60 r6:85682100 r5:84515400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec3c1fb0 to 0xec3c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8565e300 INFO: task kworker/0:394:5477 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: d822d000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:777:5478 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:777 state:D stack:0 pid:5478 tgid:5478 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec3d5d84 r8:00000002 r7:60000013 r6:ec3d5d8c r5:84516000 r4:84516000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84516000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec3d5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8567d800 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84516000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec3a9000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8574978c r4:85749400 r4:8566fb00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8291880c r9:ec3ddd84 r8:00000002 r7:60000113 r6:ec3ddd8c r5:84513c00 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ec3b9000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85749b8c r4:85749800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85749b8c r4:8566fb80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84513c00 r8:8566fbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8566fb80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8566fb80 r8:8027f5e8 r7:ec3bde60 r6:85682200 r5:84513c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec3ddfb0 to 0xec3ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8567d680 INFO: task kworker/1:778:5480 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: d86ef000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:779:5483 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:779 state:D stack:0 pid:5483 tgid:5483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:8291880c r9:ebb7dd84 r8:00000002 r7:60000013 r6:ebb7dd8c r5:84516c00 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ec3fd000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:82ac11a4 r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:8291880c r9:ec3f5d84 r8:00000002 r7:60000013 r6:ec3f5d8c r5:84513000 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ec3f1000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8574a38c r4:8574a000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8574a38c r4:8566fc80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84513000 r8:8566fcac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8566fc80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8566fc80 r8:8027f5e8 r7:ebb7de60 r6:85682300 r5:84513000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec3f5fb0 to 0xec3f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8567da40 INFO: task kworker/1:780:5485 is blocked on a mutex likely owned by task kworker/1:171:3869. r4:82ac11a4 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84510c00 r9:83018005 r8:84510c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d9000 r5:00001000 r4:ec415000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854eb78c r4:854eb400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854eb78c r4:85682380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84510c00 r8:856823ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85682380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85682380 r8:8027f5e8 r7:ebabde60 r6:85682400 r5:84510c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe47b9d28 to 0xe47b9d70) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Not tainted 6.15.0-syzkaller #0 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r7:ddde2d80 r6:83018200 r5:8574ab8c r4:8566fd00 task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 INFO: task kworker/1:782:5490 blocked for more than 467 seconds. task:kworker/1:782 state:D stack:0 pid:5490 tgid:5490 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec419d84 r8:00000002 r7:60000013 r6:ec419d8c r5:84d20000 r4:84d20000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d20000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec419e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85683940 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84d20000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d7000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec409000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11a4 r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:84d20c00 r4:82918808 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ec429000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xec3d9fb0 to 0xec3d9ff8) Call trace: 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 r4:00000000 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:8291880c r9:ec42dd84 r8:00000002 r7:60000013 r6:ec42dd8c r5:84d21800 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85679140 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84d21800 r7:00000000 r6:83018200 r5:00001000 r4:7f0e9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec475000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8574b38c r4:8574b000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8574b38c r4:8566fe00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d21800 r8:8566fe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8566fe00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8566fe00 r8:8027f5e8 r7:ec40de60 r6:85682680 r5:84d21800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec42dfb0 to 0xec42dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8567de80 INFO: task kworker/1:783:5495 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: d96a8000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 Not tainted 6.15.0-syzkaller #0 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred r4:82ac11a4 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:398:5499 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:398 state:D stack:0 pid:5499 tgid:5499 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xec445fb0 to 0xec445ff8) task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11a4 r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:8291880c r9:ec439d84 r8:00000002 r7:60000113 r6:ec439d8c r5:84d23c00 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857bd580 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d23c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0fd000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85715b8c r4:85715800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85715b8c r4:85682900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d23c00 r8:8568292c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85682900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85682900 r8:8027f5e8 r7:ec445e60 r6:85682980 r5:84d23c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec439fb0 to 0xec439ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85683e80 INFO: task kworker/0:399:5501 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: d9c69000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 r4:8454d780 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec44d000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe47b9d28 to 0xe47b9d70) r4:82ac11a4 r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:8291880c r9:ec469d84 r8:00000002 r7:60000013 r6:ec469d8c r5:84d25400 [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec469e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8565e980 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84d25400 r7:00000000 r6:83018200 r5:00001000 r4:7f0e5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec459000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8571438c r4:85714000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8571438c r4:8566ff00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d25400 r8:8566ff2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8566ff00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8566ff00 r8:8027f5e8 r7:ec42de60 r6:85682a80 r5:84d25400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec469fb0 to 0xec469ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856791c0 INFO: task kworker/1:785:5505 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:8454d780 r4:84e5a340 r10:8291880c r9:ec451d84 r8:00000002 r7:60000113 r6:ec451d8c r5:84d26000 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856795c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84d26000 r7:00000000 r6:83018200 r5:00001000 r4:7f0eb000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec481000 r5:8574b78c r4:8574b400 Exception stack(0xec451fb0 to 0xec451ff8) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:84d26c00 r9:83018005 r8:84d26c00 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 r7:dddced80 r6:83018000 r5:85714f8c r4:85682b80 r4:85674040 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: da19e000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:84e5a340 task:kworker/1:787 state:D stack:0 pid:5510 tgid:5510 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec49de08 r5:00001000 r4:eadcd000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8574c78c r4:8574c400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8574c78c r4:85671000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85780000 r8:8567102c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85671000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85671000 r8:8027f5e8 r7:ec451e60 r6:85682c80 r5:85780000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec49dfb0 to 0xec49dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85679480 INFO: task kworker/1:787:5510 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: da6a1000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 r4:8454d780 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:788 state:D stack:0 pid:5514 tgid:5514 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec479e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856797c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85780c00 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e060f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8574bb8c r4:8574b800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8574bb8c r4:85671080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85780c00 r8:856710ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85671080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85671080 r8:8027f5e8 r7:ec49de60 r6:85682d00 r5:85780c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec479fb0 to 0xec479ff8) INFO: task kworker/1:788:5514 is blocked on a mutex likely owned by task kworker/1:171:3869. r4:82ac11a4 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:789 state:D stack:0 pid:5516 tgid:5516 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:85782400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85782400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9a1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85679900 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85782400 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea937000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8574bf8c r4:8574bc00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8574bf8c r4:85671100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85782400 r8:8567112c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85671100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85671100 r8:8027f5e8 r7:ec49de60 r6:85682d80 r5:85782400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9a1fb0 to 0xeb9a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85679700 INFO: task kworker/1:789:5516 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: dac02000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:790:5519 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:790 state:D stack:0 pid:5519 tgid:5519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb9f5d84 r8:00000002 r7:60000113 r6:eb9f5d8c r5:85781800 r4:85781800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85781800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9f5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85679a40 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eaa99000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85781800 r8:856711ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85671180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85671180 r8:8027f5e8 r7:ec49de60 r6:85682e00 r5:85781800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9f5fb0 to 0xeb9f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856798c0 INFO: task kworker/1:790:5519 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: db1e2000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:791:5520 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:791 state:D stack:0 pid:5520 tgid:5520 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eba01d84 r8:00000002 r7:60000113 r6:eba01d8c r5:85784800 r4:85784800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85784800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba01e08 r4:00000000 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb0d5000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8574cf8c r4:8574cc00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8574cf8c r4:85671200 r10:61c88647 r9:85784800 r8:8567122c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xeba01fb0 to 0xeba01ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: db1e2000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:792:5521 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:792 state:D stack:0 pid:5521 tgid:5521 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eba11d84 r8:00000002 r7:60000113 r6:eba11d8c r5:85785400 r4:85785400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85785400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba11e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85679cc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85785400 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb041000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8574cb8c r4:8574c800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8574cb8c r4:85671280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85785400 r8:856712ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85671280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85671280 r8:8027f5e8 r7:eba01e60 r6:85682f00 r5:85785400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba11fb0 to 0xeba11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85679940 INFO: task kworker/1:792:5521 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: db1e2000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:793:5524 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:793 state:D stack:0 pid:5524 tgid:5524 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eba45d84 r8:00000002 r7:60000013 r6:eba45d8c r5:85786c00 r4:85786c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85786c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba45e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8567d940 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85786c00 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb489000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8574db8c r4:8574d800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8574db8c r4:85671300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85786c00 r8:8567132c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85671300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85671300 r8:8027f5e8 r7:eba01e60 r6:85682f80 r5:85786c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba45fb0 to 0xeba45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85679ac0 INFO: task kworker/1:793:5524 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: db1e2000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:794:5525 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:794 state:D stack:0 pid:5525 tgid:5525 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:8291880c r9:eba51d84 r8:00000002 r7:60000113 r6:eba51d8c r5:85783000 [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb32d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8574d38c r4:8574d000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8574d38c r4:85671380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85783000 r8:856713ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85671380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85671380 r8:8027f5e8 r7:eba45e60 r6:85688000 r5:85783000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba51fb0 to 0xeba51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85679c80 INFO: task kworker/1:794:5525 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: db630000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:795:5528 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:795 state:D stack:0 pid:5528 tgid:5528 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eba79d84 r8:00000002 r7:60000013 r6:eba79d8c r5:84f10c00 r4:84f10c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f10c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba79e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85679180 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84f10c00 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb42f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8574d78c r4:8574d400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8574d78c r4:85671400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84f10c00 r8:8567142c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85671400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85671400 r8:8027f5e8 r7:eba45e60 r6:85688080 r5:84f10c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba79fb0 to 0xeba79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85679dc0 INFO: task kworker/1:795:5528 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: db9a6000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:796:5530 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:796 state:D stack:0 pid:5530 tgid:5530 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ebaa1d84 r8:00000002 r7:60000113 r6:ebaa1d8c r5:84f12400 r4:84f12400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f12400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaa1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8568d4c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84f12400 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5ed000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8574eb8c r4:8574e800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8574eb8c r4:85671480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84f12400 r8:856714ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85671480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85671480 r8:8027f5e8 r7:eba45e60 r6:85688100 r5:84f12400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebaa1fb0 to 0xebaa1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8567dbc0 INFO: task kworker/1:796:5530 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: dbd8a000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:797:5531 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:797 state:D stack:0 pid:5531 tgid:5531 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ebab9d84 r8:00000002 r7:60000013 r6:ebab9d8c r5:84f13000 r4:84f13000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f13000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebab9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85663b80 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84f13000 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4d5000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8574df8c r4:8574dc00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8574df8c r4:85671500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84f13000 r8:8567152c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85671500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85671500 r8:8027f5e8 r7:ebaa1e60 r6:85688180 r5:84f13000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebab9fb0 to 0xebab9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85663d80 INFO: task kworker/1:797:5531 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: dc0a6000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:798:5533 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:798 state:D stack:0 pid:5533 tgid:5533 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb851d84 r8:00000002 r7:60000013 r6:eb851d8c r5:856eb000 r4:856eb000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856eb000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb851e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8568d100 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856eb000 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb501000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8574e38c r4:8574e000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8574e38c r4:85671580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856eb000 r8:856715ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85671580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85671580 r8:8027f5e8 r7:ebaa1e60 r6:85671600 r5:856eb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb851fb0 to 0xeb851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8568d040 INFO: task kworker/1:798:5533 is blocked on a mutex likely owned by task kworker/1:171:3869. r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 r4:82ac11a4 r4:e47b9dc0 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:799:5535 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:799 state:D stack:0 pid:5535 tgid:5535 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ebacdd84 r8:00000002 r7:60000013 r6:ebacdd8c r5:856e9800 r4:856e9800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856e9800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebacde08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8568d300 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856e9800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb54d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8574e78c r4:8574e400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8574e78c r4:85671680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856e9800 r8:856716ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85671680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85671680 r8:8027f5e8 r7:ebaa1e60 r6:85671700 r5:856e9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebacdfb0 to 0xebacdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8568d240 INFO: task kworker/1:799:5535 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: dc2a4000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:800:5538 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:800 state:D stack:0 pid:5538 tgid:5538 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb869d84 r8:00000002 r7:60000113 r6:eb869d8c r5:856ec800 r4:856ec800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856ec800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb869e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8568d980 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856ec800 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6bd000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8574f38c r4:8574f000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8574f38c r4:85671780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856ec800 r8:856717ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85671780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85671780 r8:8027f5e8 r7:ebaa1e60 r6:85671800 r5:856ec800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb869fb0 to 0xeb869ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8568d340 INFO: task kworker/1:800:5538 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: dc8f6000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:801:5539 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:801 state:D stack:0 pid:5539 tgid:5539 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ebad5d84 r8:00000002 r7:60000113 r6:ebad5d8c r5:856ed400 r4:856ed400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856ed400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebad5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8568d680 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856ed400 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb647000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8574ef8c r4:8574ec00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8574ef8c r4:85671880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856ed400 r8:856718ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85671880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85671880 r8:8027f5e8 r7:eb869e60 r6:85671900 r5:856ed400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebad5fb0 to 0xebad5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8568d500 INFO: task kworker/1:801:5539 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: dcdfd000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:802:5540 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:802 state:D stack:0 pid:5540 tgid:5540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec4a1d84 r8:00000002 r7:60000013 r6:ec4a1d8c r5:84f13c00 r4:84f13c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f13c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4a1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8568dbc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84f13c00 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb843000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8574fb8c r4:8574f800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8574fb8c r4:85671980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84f13c00 r8:856719ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85671980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85671980 r8:8027f5e8 r7:eb869e60 r6:85688200 r5:84f13c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec4a1fb0 to 0xec4a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8568d400 INFO: task kworker/1:802:5540 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: dcdfd000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:803:5544 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:803 state:D stack:0 pid:5544 tgid:5544 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ebae1d84 r8:00000002 r7:60000013 r6:ebae1d8c r5:84f11800 r4:84f11800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f11800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebae1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8568dac0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84f11800 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb809000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8574f78c r4:8574f400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8574f78c r4:85671a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84f11800 r8:85671a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85671a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85671a00 r8:8027f5e8 r7:ec4a1e60 r6:85688280 r5:84f11800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebae1fb0 to 0xebae1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8568d740 INFO: task kworker/1:803:5544 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: dd4a9000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:804:5547 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:804 state:D stack:0 pid:5547 tgid:5547 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec4a5d84 r8:00000002 r7:60000013 r6:ec4a5d8c r5:856ebc00 r4:856ebc00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856ebc00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4a5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8568dcc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856ebc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb865000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8574ff8c r4:8574fc00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8574ff8c r4:85671a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856ebc00 r8:85671aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85671a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85671a80 r8:8027f5e8 r7:ec4a1e60 r6:85671b00 r5:856ebc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec4a5fb0 to 0xec4a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8568d9c0 INFO: task kworker/1:804:5547 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: dd4a9000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84e5a340 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r10:8291880c r9:ec4b5d84 r8:00000002 r7:60000113 r6:ec4b5d8c r5:856eec00 r4:856eec00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856eec00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4b5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857be940 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856eec00 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba75000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85755b8c r4:85755800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85755b8c r4:85671b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856eec00 r8:85671bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85671b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85671b80 r8:8027f5e8 r7:ec4a5e60 r6:85671c00 r5:856eec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec4b5fb0 to 0xec4b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8568da40 INFO: task kworker/1:805:5549 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: dd4a9000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:401:5550 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:401 state:D stack:0 pid:5550 tgid:5550 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec4a9d84 r8:00000002 r7:60000113 r6:ec4a9d8c r5:856ee000 r4:856ee000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856ee000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4a9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857bd500 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856ee000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba89000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8571538c r4:85715000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8571538c r4:85688300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856ee000 r8:8568832c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85688300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85688300 r8:8027f5e8 r7:ec439e60 r6:85671c80 r5:856ee000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec4a9fb0 to 0xec4a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857be000 INFO: task kworker/0:401:5550 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: dd6c0000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:806:5551 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:806 state:D stack:0 pid:5551 tgid:5551 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec4bdd84 r8:00000002 r7:60000013 r6:ec4bdd8c r5:856ea400 r4:856ea400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856ea400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4bde08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8568de40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856ea400 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9b3000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8575438c r4:85754000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8575438c r4:85671d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856ea400 r8:85671d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85671d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85671d00 r8:8027f5e8 r7:ec4b5e60 r6:85671d80 r5:856ea400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec4bdfb0 to 0xec4bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8568de00 INFO: task kworker/1:806:5551 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: dd6c0000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:807:5553 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:807 state:D stack:0 pid:5553 tgid:5553 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec4c1d84 r8:00000002 r7:60000113 r6:ec4c1d8c r5:856e8000 r4:856e8000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856e8000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4c1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d4b900 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856e8000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9d1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8575478c r4:85754400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8575478c r4:85671e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856e8000 r8:85671e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85671e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85671e00 r8:8027f5e8 r7:ec4b5e60 r6:85671e80 r5:856e8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec4c1fb0 to 0xec4c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8568dfc0 INFO: task kworker/1:807:5553 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: ddb27000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:808:5556 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:808 state:D stack:0 pid:5556 tgid:5556 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec4c5d84 r8:00000002 r7:60000013 r6:ec4c5d8c r5:856e3000 r4:856e3000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856e3000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4c5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857be080 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856e3000 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9fd000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85754b8c r4:85754800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85754b8c r4:85671f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856e3000 r8:85671f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85671f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85671f00 r8:8027f5e8 r7:ec4b5e60 r6:85671f80 r5:856e3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec4c5fb0 to 0xec4c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857be140 INFO: task kworker/1:808:5556 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: ddb27000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:809:5557 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:809 state:D stack:0 pid:5557 tgid:5557 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec4c9d84 r8:00000002 r7:60000113 r6:ec4c9d8c r5:856f0000 r4:856f0000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856f0000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4c9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857be540 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba17000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85754f8c r4:85754c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85754f8c r4:857b9000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856f0000 r8:857b902c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857b9000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857b9000 r8:8027f5e8 r7:ec4b5e60 r6:857b9080 r5:856f0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec4c9fb0 to 0xec4c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857be140 INFO: task kworker/1:809:5557 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: ddb27000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:810:5560 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:810 state:D stack:0 pid:5560 tgid:5560 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec4b9d84 r8:00000002 r7:60000113 r6:ec4b9d8c r5:856f0c00 r4:856f0c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856f0c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4b9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857be640 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856f0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba2d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8575538c r4:85755000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8575538c r4:857b9100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856f0c00 r8:857b912c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857b9100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857b9100 r8:8027f5e8 r7:ec4b5e60 r6:857b9180 r5:856f0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec4b9fb0 to 0xec4b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857be440 INFO: task kworker/1:810:5560 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: de694000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:811:5561 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:811 state:D stack:0 pid:5561 tgid:5561 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec4cdd84 r8:00000002 r7:60000113 r6:ec4cdd8c r5:856f1800 r4:856f1800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856f1800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4cde08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857be800 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856f1800 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba41000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8575578c r4:85755400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8575578c r4:857b9200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856f1800 r8:857b922c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857b9200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857b9200 r8:8027f5e8 r7:ec4b5e60 r6:857b9280 r5:856f1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec4cdfb0 to 0xec4cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857be440 INFO: task kworker/1:811:5561 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: de694000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:812:5564 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:812 state:D stack:0 pid:5564 tgid:5564 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec4d5d84 r8:00000002 r7:60000113 r6:ec4d5d8c r5:856f3000 r4:856f3000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856f3000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4d5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857beec0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856f3000 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaef000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8575678c r4:85756400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8575678c r4:857b9300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856f3000 r8:857b932c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857b9300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857b9300 r8:8027f5e8 r7:ec4b5e60 r6:857b9380 r5:856f3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec4d5fb0 to 0xec4d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857be7c0 INFO: task kworker/1:812:5564 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: decd2000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:813:5566 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:813 state:D stack:0 pid:5566 tgid:5566 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec4ddd84 r8:00000002 r7:60000113 r6:ec4ddd8c r5:856f2400 r4:856f2400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856f2400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4dde08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857becc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856f2400 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaa9000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85755f8c r4:85755c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85755f8c r4:857b9400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856f2400 r8:857b942c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857b9400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857b9400 r8:8027f5e8 r7:ec4d5e60 r6:857b9480 r5:856f2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec4ddfb0 to 0xec4ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857be680 INFO: task kworker/1:813:5566 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: decd2000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:814:5568 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:814 state:D stack:0 pid:5568 tgid:5568 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec4f9d84 r8:00000002 r7:60000113 r6:ec4f9d8c r5:84f16c00 r4:84f16c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f16c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4f9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857bed00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84f16c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebac9000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8575638c r4:85756000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8575638c r4:857b9500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84f16c00 r8:857b952c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857b9500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857b9500 r8:8027f5e8 r7:ec4d5e60 r6:85688380 r5:84f16c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec4f9fb0 to 0xec4f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857bec40 INFO: task kworker/1:814:5568 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: deed4000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:402:5570 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:402 state:D stack:0 pid:5570 tgid:5570 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec501d84 r8:00000002 r7:60000113 r6:ec501d8c r5:84f14800 r4:84f14800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f14800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec501e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857bddc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f14800 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1bd000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85715f8c r4:85715c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85715f8c r4:85688400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84f14800 r8:8568842c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85688400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85688400 r8:8027f5e8 r7:ec439e60 r6:85688480 r5:84f14800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec501fb0 to 0xec501ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857bd640 INFO: task kworker/0:402:5570 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: deed4000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:815:5573 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:815 state:D stack:0 pid:5573 tgid:5573 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec50dd84 r8:00000002 r7:60000113 r6:ec50dd8c r5:856e5400 r4:856e5400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856e5400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec50de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857be980 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856e5400 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebafd000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85756b8c r4:85756800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85756b8c r4:857b9580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856e5400 r8:857b95ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857b9580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857b9580 r8:8027f5e8 r7:ec4d5e60 r6:85688500 r5:856e5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec50dfb0 to 0xec50dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857bed40 INFO: task kworker/1:815:5573 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: df41a000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:816:5574 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:816 state:D stack:0 pid:5574 tgid:5574 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec511d84 r8:00000002 r7:60000113 r6:ec511d8c r5:84f16000 r4:84f16000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f16000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec511e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85674c40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84f16000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec493000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85756f8c r4:85756c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85756f8c r4:857b9600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84f16000 r8:857b962c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857b9600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857b9600 r8:8027f5e8 r7:ec50de60 r6:85688580 r5:84f16000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec511fb0 to 0xec511ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857bed40 INFO: task kworker/1:816:5574 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: df41a000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:817:5576 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:817 state:D stack:0 pid:5576 tgid:5576 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec519d84 r8:00000002 r7:60000113 r6:ec519d8c r5:85783c00 r4:85783c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85783c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec519e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857bc040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85783c00 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec4f5000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8575738c r4:85757000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8575738c r4:857b9680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85783c00 r8:857b96ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857b9680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857b9680 r8:8027f5e8 r7:ec511e60 r6:85688600 r5:85783c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec519fb0 to 0xec519ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857befc0 INFO: task kworker/1:817:5576 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 9d60: 80230ad4 80239bb0 80070013 ffffffff [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 r4:00000001 r4:84e5a340 Not tainted 6.15.0-syzkaller #0 r4:85786000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85786000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec51de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857bc700 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85786000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec54d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8575838c r4:85758000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8575838c r4:857b9700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85786000 r8:857b972c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857b9700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857b9700 r8:8027f5e8 r7:ec519e60 r6:85688680 r5:85786000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec51dfb0 to 0xec51dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857befc0 INFO: task kworker/1:818:5577 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: dff21000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:819:5580 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:819 state:D stack:0 pid:5580 tgid:5580 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec541d84 r8:00000002 r7:60000013 r6:ec541d8c r5:844f0c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec541e08 r4:00000000 r5:00001000 r4:ec525000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8575778c r4:857b9780 Exception stack(0xec541fb0 to 0xec541ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 9d60: 80230ad4 80239bb0 80070013 ffffffff r4:00000000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:ec531000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85757b8c r4:85757800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85757b8c r4:857b9800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856f4800 r8:857b982c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857b9800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857b9800 r8:8027f5e8 r7:ec51de60 r6:857b9880 r5:856f4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec4d9fb0 to 0xec4d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857bc100 INFO: task kworker/1:820:5581 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: e0682000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:821:5583 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:821 state:D stack:0 pid:5583 tgid:5583 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec535d84 r8:00000002 r7:60000113 r6:ec535d8c r5:856f5400 r4:856f5400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856f5400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec535e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857bc580 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856f5400 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec53d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85757f8c r4:85757c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:857b9900 r8:8027f5e8 r7:ec51de60 r6:857b9980 r5:856f5400 INFO: task kworker/1:821:5583 is blocked on a mutex likely owned by task kworker/1:171:3869. 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8454d780 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec545d84 r8:00000002 r7:60000113 r6:ec545d8c r5:856f6000 r4:856f6000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856f6000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec545e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857bcb40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856f6000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec575000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85758f8c r4:85758c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85758f8c r4:857b9a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856f6000 r8:857b9aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857b9a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857b9a80 r8:8027f5e8 r7:ec51de60 r6:857b9b00 r5:856f6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec545fb0 to 0xec545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857bc7c0 INFO: task kworker/1:822:5586 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: e0bbe000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:823:5587 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:823 state:D stack:0 pid:5587 tgid:5587 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec55dd84 r8:00000002 r7:60000013 r6:ec55dd8c r5:856f6c00 r4:856f6c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856f6c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec55de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857bc7c0 r5:00001000 r4:ec559000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8575878c r4:85758400 r10:61c88647 r9:856f6c00 r8:857b9a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec569e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857bca00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856f3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec565000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85758b8c r4:85758800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85758b8c r4:857b9c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856f3c00 r8:857b9c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857b9c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857b9c00 r8:8027f5e8 r7:ec545e60 r6:857b9c80 r5:856f3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec569fb0 to 0xec569ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857bc640 INFO: task kworker/1:824:5590 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: e0e2f000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:8291880c r9:ec58dd84 r8:00000002 r7:60000013 r6:ec58dd8c r5:84f10000 r4:00000000 r9:83018205 r8:84f10000 r7:00000000 r6:83018200 r5:00001000 r4:7f027000 r5:00001000 r4:dfa6f000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:857b9d00 r8:8027f5e8 r7:ec545e60 r6:857b9d80 r5:84f10000 task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 INFO: task kworker/1:826:5594 blocked for more than 468 seconds. r4:856f8000 [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:856f8000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000 r5:00001000 r4:ec59b000 r7:ddde2d80 r6:83018200 r5:8575938c r4:857b9e00 r10:61c88647 r9:856f8000 r8:857b9e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857b9e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857b9e00 r8:8027f5e8 r7:ec58de60 r6:857b9e80 r5:856f8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec4d1fb0 to 0xec4d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857bcb00 INFO: task kworker/1:826:5594 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: e16c4000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 INFO: task kworker/1:827:5595 blocked for more than 468 seconds. r4:856f8c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5b9e08 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb40f000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xec5b9fb0 to 0xec5b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857bcb00 INFO: task kworker/1:827:5595 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: e1953000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:828:5598 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:828 state:D stack:0 pid:5598 tgid:5598 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb96dd84 r8:00000002 r7:60000113 r6:eb96dd8c r5:856f9800 r4:856f9800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856f9800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb96de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d4ba40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856f9800 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfae3000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85759b8c r4:85759800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85759b8c r4:857dc000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856f9800 r8:857dc02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857dc000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:82ac11a4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85759f8c r4:85759c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85759f8c r4:857dc100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856fb000 r8:857dc12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857dc100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dc100 r8:8027f5e8 r7:ec5b9e60 r6:857dc180 r5:856fb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb979fb0 to 0xeb979ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857bcf40 INFO: task kworker/1:829:5599 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: e2154000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:830:5601 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:830 state:D stack:0 pid:5601 tgid:5601 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ebb69d84 r8:00000002 r7:60000113 r6:ebb69d8c r5:856fa400 r4:856fa400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856fa400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb69e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857bd000 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856fa400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaca1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8571578c r4:85715400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8571578c r4:857dc200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856fa400 r8:857dc22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857dc200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dc200 r8:8027f5e8 r7:ec5b9e60 r6:857dc280 r5:856fa400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb69fb0 to 0xebb69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857da300 INFO: task kworker/1:830:5601 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: e28d0000 e8845000 00000001 80239b98 7f1c9000 00000001 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:ece91000 r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:831:5604 blocked for more than 468 seconds. task:kworker/1:831 state:D stack:0 pid:5604 tgid:5604 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:856fc800 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:eae0b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:856fc800 r8:857dc32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857dc300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dc300 r8:8027f5e8 r7:ec5b9e60 r6:857dc380 r5:856fc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec3a1fb0 to 0xec3a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857da740 INFO: task kworker/1:831:5604 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: e2c1b000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:832:5607 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:832 state:D stack:0 pid:5607 tgid:5607 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec5bdd84 r8:00000002 r7:60000113 r6:ec5bdd8c r5:856fd400 r4:856fd400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856fd400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5bde08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857dadc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856fd400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3db000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8575ab8c r4:8575a800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8575ab8c r4:857dc400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856fd400 r8:857dc42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857dc400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dc400 r8:8027f5e8 r7:ec5b9e60 r6:857dc480 r5:856fd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5bdfb0 to 0xec5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857da540 INFO: task kworker/1:832:5607 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: e2e2a000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:403:5608 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:403 state:D stack:0 pid:5608 tgid:5608 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec5c5d84 r8:00000002 r7:60000113 r6:ec5c5d8c r5:856fec00 r4:856fec00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856fec00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5c5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d6280 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856fec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb373000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8571678c r4:85716400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8571678c r4:85688780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856fec00 r8:856887ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85688780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85688780 r8:8027f5e8 r7:ec501e60 r6:85688800 r5:856fec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5c5fb0 to 0xec5c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857bd040 INFO: task kworker/0:403:5608 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: e31b2000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:404:5610 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:404 state:D stack:0 pid:5610 tgid:5610 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec5a5d84 r8:00000002 r7:60000113 r6:ec5a5d8c r5:844f2400 r4:844f2400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844f2400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5a5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d6140 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844f2400 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb25f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8571638c r4:85716000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8571638c r4:85688880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844f2400 r8:856888ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85688880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85688880 r8:8027f5e8 r7:ec5c5e60 r6:85688900 r5:844f2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5a5fb0 to 0xec5a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857bd040 INFO: task kworker/0:404:5610 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: e31b2000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:405:5613 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:405 state:D stack:0 pid:5613 tgid:5613 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec5c1d84 r8:00000002 r7:60000013 r6:ec5c1d8c r5:844f1800 r4:844f1800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844f1800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5c1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85835280 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844f1800 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e062d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85717f8c r4:85717c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85717f8c r4:85688980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844f1800 r8:856889ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85688980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85688980 r8:8027f5e8 r7:ec5c5e60 r6:85688a00 r5:844f1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5c1fb0 to 0xec5c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857d6100 INFO: task kworker/0:405:5613 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: e34d7000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:406:5614 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:406 state:D stack:0 pid:5614 tgid:5614 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ebb79d84 r8:00000002 r7:60000113 r6:ebb79d8c r5:844f3000 r4:844f3000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844f3000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb79e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d6ac0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844f3000 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb78b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85716b8c r4:85716800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85716b8c r4:85688a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844f3000 r8:85688aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85688a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85688a80 r8:8027f5e8 r7:ec5c1e60 r6:85688b00 r5:844f3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb79fb0 to 0xebb79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857d6100 INFO: task kworker/0:406:5614 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: e36df000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:833:5617 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:833 state:D stack:0 pid:5617 tgid:5617 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec5d1d84 r8:00000002 r7:60000113 r6:ec5d1d8c r5:844f3c00 r4:844f3c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844f3c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5d1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857daa80 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:844f3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb597000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8575b38c r4:8575b000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8575b38c r4:857dc500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844f3c00 r8:857dc52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857dc500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dc500 r8:8027f5e8 r7:ec5b9e60 r6:85688b80 r5:844f3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5d1fb0 to 0xec5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857dabc0 INFO: task kworker/1:833:5617 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: e3b9c000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:834:5618 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:834 state:D stack:0 pid:5618 tgid:5618 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec5d5d84 r8:00000002 r7:60000013 r6:ec5d5d8c r5:844f4800 r4:844f4800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844f4800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5d5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857da5c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:844f4800 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb719000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8575b78c r4:8575b400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8575b78c r4:857dc580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844f4800 r8:857dc5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857dc580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dc580 r8:8027f5e8 r7:ec5d1e60 r6:85688c00 r5:844f4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5d5fb0 to 0xec5d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857dae80 INFO: task kworker/1:834:5618 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: e3c32000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:835:5621 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:835 state:D stack:0 pid:5621 tgid:5621 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec5e1d84 r8:00000002 r7:60000013 r6:ec5e1d8c r5:844f5400 r4:844f5400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844f5400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5e1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857da0c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:844f5400 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb757000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8575bb8c r4:8575b800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8575bb8c r4:857dc600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844f5400 r8:857dc62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857dc600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dc600 r8:8027f5e8 r7:ec5d5e60 r6:85688c80 r5:844f5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5e1fb0 to 0xec5e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857dafc0 INFO: task kworker/1:835:5621 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: e3ea6000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:836:5623 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:836 state:D stack:0 pid:5623 tgid:5623 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec5e9d84 r8:00000002 r7:60000013 r6:ec5e9d8c r5:844f0000 r4:844f0000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844f0000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5e9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d7340 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:844f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7c5000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8576478c r4:85764400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8576478c r4:857dc680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844f0000 r8:857dc6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857dc680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dc680 r8:8027f5e8 r7:ec5e1e60 r6:85688d00 r5:844f0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5e9fb0 to 0xec5e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857dafc0 INFO: task kworker/1:836:5623 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: e40d0000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:837:5624 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:837 state:D stack:0 pid:5624 tgid:5624 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec5edd84 r8:00000002 r7:60000013 r6:ec5edd8c r5:844f6000 r4:844f6000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844f6000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5ede08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d4bac0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:844f6000 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb76f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8575bf8c r4:8575bc00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8575bf8c r4:857dc700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844f6000 r8:857dc72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857dc700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dc700 r8:8027f5e8 r7:ec5e9e60 r6:85688d80 r5:844f6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5edfb0 to 0xec5edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857dafc0 INFO: task kworker/1:837:5624 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: e40d0000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:407:5627 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:407 state:D stack:0 pid:5627 tgid:5627 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec5cdd84 r8:00000002 r7:60000113 r6:ec5cdd8c r5:844f6c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5cde08 r9:83018005 r8:844f6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:82ac11a4 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:838:5628 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:838 state:D stack:0 pid:5628 tgid:5628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec5f1d84 r8:00000002 r7:60000013 r6:ec5f1d8c r5:847c0000 r4:847c0000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847c0000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5f1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d70c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847c0000 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7ab000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8576438c r4:85764000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8576438c r4:857dc780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847c0000 r8:857dc7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857dc780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dc780 r8:8027f5e8 r7:ec5e9e60 r6:85688f00 r5:847c0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5f1fb0 to 0xec5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857d7000 INFO: task kworker/1:838:5628 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 9d20: e4657000 e8845000 00000001 80239b98 7f1c9000 00000001 r4:e47b9dc0 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:839:5631 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:839 state:D stack:0 pid:5631 tgid:5631 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:847c0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:82ac11a4 r4:e47b9dc0 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe47b9fb0 to 0xe47b9ff8) INFO: task kworker/1:840:5632 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:840 state:D stack:0 pid:5632 tgid:5632 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec5f9d84 r8:00000002 r7:60000113 r6:ec5f9d8c r5:847c1800 r4:847c1800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847c1800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5f9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d7500 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847c1800 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb923000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85764b8c r4:85764800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85764b8c r4:857dc880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847c1800 r8:857dc8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857dc880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dc880 r8:8027f5e8 r7:ec5f5e60 r6:857d5000 r5:847c1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5f9fb0 to 0xec5f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857d7380 INFO: task kworker/1:840:5632 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: e4c34000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:847c2400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5e5e08 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847c2400 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb75000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85764f8c r4:85764c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85764f8c r4:857dc900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847c2400 r8:857dc92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857dc900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dc900 r8:8027f5e8 r7:ec5f5e60 r6:857d5080 r5:847c2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5e5fb0 to 0xec5e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857d7440 INFO: task kworker/1:841:5634 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Not tainted 6.15.0-syzkaller #0 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) INFO: task kworker/0:408:5636 is blocked on a mutex likely owned by task kworker/1:171:3869. 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:847c4800 r4:82918808 r4:00000000 r4:00000000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xec605fb0 to 0xec605ff8) INFO: task kworker/1:842:5639 is blocked on a mutex likely owned by task kworker/1:171:3869. r4:82ac11a4 r5:85a7af8c r4:85a7ac00 r4:8454d780 Exception stack(0xe47b9fb0 to 0xe47b9ff8) Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:843 state:D stack:0 pid:5642 tgid:5642 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec611d84 r8:00000002 r7:60000113 r6:ec611d8c r5:847c3c00 r4:847c3c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847c3c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec611e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d7d40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847c3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec3e7000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8576638c r4:85766000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8576638c r4:857dca00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847c3c00 r8:857dca2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857dca00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dca00 r8:8027f5e8 r7:ec5f5e60 r6:857d5280 r5:847c3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec611fb0 to 0xec611ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857d7740 INFO: task kworker/1:843:5642 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: e51da000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:00000000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8291880c r9:ec615d84 r8:00000002 r7:60000013 r6:ec615d8c r5:847c6c00 r5:847c6c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec615e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d7a80 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847c6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec3b3000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85765b8c r4:85765800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85765b8c r4:857dca80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847c6c00 r8:857dcaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857dca80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dca80 r8:8027f5e8 r7:ec611e60 r6:857d5300 r5:847c6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec615fb0 to 0xec615ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857d7740 INFO: task kworker/1:844:5643 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: e56bc000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ece91000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:845:5645 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:845 state:D stack:0 pid:5645 tgid:5645 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec5fdd84 r8:00000002 r7:60000113 r6:ec5fdd8c r5:856fe000 r4:856fe000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856fe000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5fde08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d7bc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856fe000 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec3c5000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85765f8c r4:85765c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85765f8c r4:857dcb00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856fe000 r8:857dcb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857dcb00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dcb00 r8:8027f5e8 r7:ec611e60 r6:857dcb80 r5:856fe000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5fdfb0 to 0xec5fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857d7900 INFO: task kworker/1:845:5645 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 9fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d74c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856fbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec405000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85766b8c r4:85766800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85766b8c r4:857dcc00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856fbc00 r8:857dcc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857dcc00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dcc00 r8:8027f5e8 r7:ec611e60 r6:857dcc80 r5:856fbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec61dfb0 to 0xec61dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857d7a40 INFO: task kworker/1:846:5648 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 Exception stack(0xe47b9d28 to 0xe47b9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r10:8291880c r9:ec629d84 r8:00000002 r7:60000113 r6:ec629d8c r5:85798000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec629e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d7ec0 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dcd00 r8:8027f5e8 r7:ec61de60 r6:857d5380 r5:85798000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec629fb0 to 0xec629ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857d7a40 INFO: task kworker/1:847:5650 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: e5c33000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:848:5652 blocked for more than 469 seconds. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:848 state:D stack:0 pid:5652 tgid:5652 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec631d84 r8:00000002 r7:60000113 r6:ec631d8c r5:8579a400 r4:8579a400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8579a400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec631e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857e7040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8579a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec431000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8576778c r4:85767400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8576778c r4:857dcd80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8579a400 r8:857dcdac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:857dcd80 r8:8027f5e8 r7:ec61de60 r6:857d5400 r5:8579a400 r4:857d7cc0 task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe47b9d28 to 0xe47b9d70) 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:849:5653 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:849 state:D stack:0 pid:5653 tgid:5653 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec635d84 r8:00000002 r7:60000013 r6:ec635d8c r5:85798c00 r4:85798c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85798c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec635e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r4:00000000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:857d7e80 task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe47b9d28 to 0xe47b9d70) 9d60: 80230ad4 80239bb0 80070013 ffffffff r4:82ac11a4 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:850:5655 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:850 state:D stack:0 pid:5655 tgid:5655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec63dd84 r8:00000002 r7:60000113 r6:ec63dd8c r5:85799800 r4:85799800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85799800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec63de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d6700 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85799800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec423000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8576738c r4:85767000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8576738c r4:857dce80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85799800 r8:857dceac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857dce80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dce80 r8:8027f5e8 r7:ec631e60 r6:857d5500 r5:85799800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec63dfb0 to 0xec63dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857d65c0 INFO: task kworker/1:850:5655 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: e641c000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:ece91000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:851:5657 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:851 state:D stack:0 pid:5657 tgid:5657 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec645d84 r8:00000002 r7:60000113 r6:ec645d8c r5:8579c800 r4:8579c800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8579c800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec645e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857e7940 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8579c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec677000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8576cf8c r4:8576cc00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8576cf8c r4:857dcf00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8579c800 r8:857dcf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857dcf00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dcf00 r8:8027f5e8 r7:ec631e60 r6:857d5580 r5:8579c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec645fb0 to 0xec645ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857d65c0 INFO: task kworker/1:851:5657 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: e641c000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r10:8291880c r9:ec649d84 r8:00000002 r7:60000113 r6:ec649d8c r5:8579b000 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857d9880 INFO: task kworker/0:409:5658 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: e6580000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:852:5660 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:852 state:D stack:0 pid:5660 tgid:5660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec651d84 r8:00000002 r7:60000113 r6:ec651d8c r5:8579e000 r4:8579e000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8579e000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec651e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857e7280 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8579e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec43f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85767b8c r4:85767800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85767b8c r4:857dcf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8579e000 r8:857dcfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857dcf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dcf80 r8:8027f5e8 r7:ec645e60 r6:857d5700 r5:8579e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec651fb0 to 0xec651ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:82ac11a4 r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:853:5662 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:853 state:D stack:0 pid:5662 tgid:5662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec659d84 r8:00000002 r7:60000113 r6:ec659d8c r5:8579ec00 r4:8579ec00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8579ec00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec659e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857e7440 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8579ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec453000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85767f8c r4:85767c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85767f8c r4:857ed000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8579ec00 r8:857ed02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857ed000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857ed000 r8:8027f5e8 r7:ec645e60 r6:857d5780 r5:8579ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec659fb0 to 0xec659ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857e7100 INFO: task kworker/1:853:5662 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: e6964000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:854:5665 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:854 state:D stack:0 pid:5665 tgid:5665 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec665d84 r8:00000002 r7:60000113 r6:ec665d8c r5:847c5400 r4:847c5400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847c5400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec665e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857e7540 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847c5400 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec461000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8576c38c r4:8576c000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8576c38c r4:857ed080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847c5400 r8:857ed0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857ed080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857ed080 r8:8027f5e8 r7:ec645e60 r6:857d5800 r5:847c5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec665fb0 to 0xec665ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857e72c0 INFO: task kworker/1:854:5665 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: e6d49000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:855:5666 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:855 state:D stack:0 pid:5666 tgid:5666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec669d84 r8:00000002 r7:60000013 r6:ec669d8c r5:8579d400 r4:8579d400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8579d400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec669e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857e7680 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8579d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec473000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:82ac11a4 r4:e47b9dc0 r4:00000000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85a7af8c r4:85a7ac00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84f50c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec675e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857e77c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84f50c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec487000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8576cb8c r4:8576c800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8576cb8c r4:857ed180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84f50c00 r8:857ed1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857ed180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857ed180 r8:8027f5e8 r7:ec645e60 r6:857d5900 r5:84f50c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec675fb0 to 0xec675ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857e7500 INFO: task kworker/1:856:5669 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: e7487000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:857:5672 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:857 state:D stack:0 pid:5672 tgid:5672 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec689d84 r8:00000002 r7:60000013 r6:ec689d8c r5:84f51800 r4:84f51800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f51800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec689e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857e7bc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84f51800 r7:00000000 r6:83018200 r5:00001000 r4:7f0c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec68f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8576d78c r4:8576d400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8576d78c r4:857ed200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84f51800 r8:857ed22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857ed200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857ed200 r8:8027f5e8 r7:ec645e60 r6:857d5980 r5:84f51800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec689fb0 to 0xec689ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857e7740 INFO: task kworker/1:857:5672 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: e7487000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:858:5673 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:858 state:D stack:0 pid:5673 tgid:5673 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec68dd84 r8:00000002 r7:60000113 r6:ec68dd8c r5:84f52400 r4:84f52400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f52400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec68de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857e7a80 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84f52400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec67f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8576d38c r4:8576d000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8576d38c r4:857ed280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84f52400 r8:857ed2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857ed280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857ed280 r8:8027f5e8 r7:ec689e60 r6:857d5a00 r5:84f52400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec68dfb0 to 0xec68dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857e7500 INFO: task kworker/1:858:5673 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: e76c4000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:859:5674 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:859 state:D stack:0 pid:5674 tgid:5674 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec699d84 r8:00000002 r7:60000013 r6:ec699d8c r5:84f53000 r4:84f53000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f53000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec699e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8566d980 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84f53000 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb723000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8576db8c r4:8576d800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8576db8c r4:857ed300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84f53000 r8:857ed32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857ed300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857ed300 r8:8027f5e8 r7:ec689e60 r6:857d5a80 r5:84f53000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec699fb0 to 0xec699ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857e7b00 INFO: task kworker/1:859:5674 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: e76c4000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:860:5677 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:860 state:D stack:0 pid:5677 tgid:5677 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec671d84 r8:00000002 r7:60000113 r6:ec671d8c r5:84f53c00 r4:84f53c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f53c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec671e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857e9900 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84f53c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba8f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8576e38c r4:8576e000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8576e38c r4:857ed380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84f53c00 r8:857ed3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857ed380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857ed380 r8:8027f5e8 r7:ec699e60 r6:857d5b00 r5:84f53c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec671fb0 to 0xec671ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857e7c00 INFO: task kworker/1:860:5677 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: e77f9000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:410:5681 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:410 state:D stack:0 pid:5681 tgid:5681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec66dd84 r8:00000002 r7:60000113 r6:ec66dd8c r5:84f54800 r4:84f54800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f54800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec66de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85835400 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f54800 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa39000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84c3978c r4:84c39400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84c3978c r4:857d5b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84f54800 r8:857d5bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857d5b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857d5b80 r8:8027f5e8 r7:ec5c1e60 r6:857d5c00 r5:84f54800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec66dfb0 to 0xec66dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85835100 INFO: task kworker/0:410:5681 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: e7c89000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:411:5683 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:411 state:D stack:0 pid:5683 tgid:5683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eb9d9d84 r8:00000002 r7:60000113 r6:eb9d9d8c r5:84f55400 r4:84f55400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f55400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9d9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85835780 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f55400 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb091000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84c38f8c r4:84c38c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84c38f8c r4:857d5c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84f55400 r8:857d5cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857d5c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857d5c80 r8:8027f5e8 r7:ec66de60 r6:857d5d00 r5:84f55400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9d9fb0 to 0xeb9d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:858352c0 INFO: task kworker/0:411:5683 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: e8032000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:412:5684 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:412 state:D stack:0 pid:5684 tgid:5684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec601d84 r8:00000002 r7:60000113 r6:ec601d8c r5:84f56000 r4:84f56000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f56000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec601e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85835600 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f56000 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaba1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84f56000 r8:857d5dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857d5d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857d5d80 r8:8027f5e8 r7:eb9d9e60 r6:857d5e00 r5:84f56000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec601fb0 to 0xec601ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:858353c0 INFO: task kworker/0:412:5684 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: e8032000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8291880c r9:eb9e5d84 r8:00000002 r7:60000113 r6:eb9e5d8c r5:84f56c00 r5:84f56c00 r4:82918808 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9e5e08 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018205 r8:84f56c00 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:857ed400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: e80c4000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:413:5688 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:413 state:D stack:0 pid:5688 tgid:5688 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eba25d84 r8:00000002 r7:60000113 r6:eba25d8c r5:84f50000 r4:84f50000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f50000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba25e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85835b40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f50000 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb493000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85738b8c r4:85738800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85738b8c r4:857d5f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84f50000 r8:857d5f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857d5f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857d5f00 r8:8027f5e8 r7:eb9d9e60 r6:857d5f80 r5:84f50000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba25fb0 to 0xeba25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85835580 INFO: task kworker/0:413:5688 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: e80c4000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:414:5690 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:414 state:D stack:0 pid:5690 tgid:5690 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eba5dd84 r8:00000002 r7:60000113 r6:eba5dd8c r5:857f8000 r4:857f8000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857f8000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba5de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858358c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857f8000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0e3000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8573838c r4:85738000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8573838c r4:857f1000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857f8000 r8:857f102c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857f1000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857f1000 r8:8027f5e8 r7:eba25e60 r6:857ed480 r5:857f8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba5dfb0 to 0xeba5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85835480 INFO: task kworker/0:414:5690 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:862:5692 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:862 state:D stack:0 pid:5692 tgid:5692 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eba3dd84 r8:00000002 r7:60000113 r6:eba3dd8c r5:857f9800 r4:857f9800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857f9800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba3de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857e9440 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:857f9800 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5f3000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8573978c r4:85739400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8573978c r4:857ed500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857f9800 r8:857ed52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857ed500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857ed500 r8:8027f5e8 r7:ec671e60 r6:857ed580 r5:857f9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba3dfb0 to 0xeba3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d4bdc0 INFO: task kworker/1:862:5692 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: e85f3000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:415:5694 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:415 state:D stack:0 pid:5694 tgid:5694 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eba8dd84 r8:00000002 r7:60000113 r6:eba8dd8c r5:857fb000 r4:857fb000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857fb000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba8de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85835c40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857fb000 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4f9000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85738f8c r4:85738c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85738f8c r4:857f1080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857fb000 r8:857f10ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857f1080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857f1080 r8:8027f5e8 r7:eba25e60 r6:857ed600 r5:857fb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba8dfb0 to 0xeba8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:858359c0 INFO: task kworker/0:415:5694 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe47b9d28 to 0xe47b9d70) 9d20: e8711000 e8845000 00000001 80239b98 7f1c9000 00000001 9d40: 82ac0560 7f1c9000 e8845000 8280c930 82ac1184 e47b9da4 e47b9da8 e47b9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e47b9dc0 r5:e47b9e08 r4:e47b9dc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7af8c r4:85a7ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7af8c r4:8454d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8454d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454d780 r8:8027f5e8 r7:e882de60 r6:8454d800 r5:8501d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47b9fb0 to 0xe47b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5a340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:416:5696 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:416 state:D stack:0 pid:5696 tgid:5696 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec529d84 r8:00000002 r7:60000113 r6:ec529d8c r5:857fc800 r4:857fc800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857fc800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec529e08 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018005 r8:857fc800 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 r5:8573938c r4:85739000 r7:dddced80 r6:83018000 r5:8573938c r4:857f1100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857fc800 r8:857f112c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857f1100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857f1100 r8:8027f5e8 r7:eba8de60 r6:857ed680 r5:857fc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec529fb0 to 0xec529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85835a40 INFO: task kworker/0:416:5696 is blocked on a mutex likely owned by task kworker/1:171:3869. task:kworker/1:171 state:R running task stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:8501d400 r8:80200be4 r7:e47b9d5c r6:ffffffff r5:8501d400 r4:00000000 Backtrace aborted due to bad frame pointer Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:417:5698 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:417 state:D stack:0 pid:5698 tgid:5698 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec551d84 r8:00000002 r7:60000113 r6:ec551d8c r5:857fd400 r4:857fd400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857fd400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec551e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85835e40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857fd400 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb659000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85739b8c r4:85739800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85739b8c r4:857f1180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857fd400 r8:857f11ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857f1180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857f1180 r8:8027f5e8 r7:ec529e60 r6:857ed700 r5:857fd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec551fb0 to 0xec551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85835bc0 INFO: task kworker/0:417:5698 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 7f612000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 90070013 ffffffff r5:90070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:418:5699 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:418 state:D stack:0 pid:5699 tgid:5699 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec6add84 r8:00000002 r7:60000113 r6:ec6add8c r5:857fbc00 r4:857fbc00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857fbc00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6ade08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857e5fc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857fbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec507000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8573c78c r4:8573c400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8573c78c r4:857f1200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857fbc00 r8:857f122c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857f1200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857f1200 r8:8027f5e8 r7:ec551e60 r6:857ed780 r5:857fbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6adfb0 to 0xec6adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85835bc0 INFO: task kworker/0:418:5699 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 7fa00000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 90070013 ffffffff r5:90070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/0:419 state:D stack:0 pid:5702 tgid:5702 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6b5e08 r5:00001000 r4:eb6b1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85739f8c r4:857f1280 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe884dd28 to 0xe884dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r5:00001000 r4:e884f000 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Call trace: [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857e9ac0 r5:00001000 r4:eba65000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:857fe000 r8:857ed8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857ed880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857ed880 r8:8027f5e8 r7:ec671e60 r6:857ed900 r5:857fe000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6b9fb0 to 0xec6b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857e9400 INFO: task kworker/1:863:5703 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 7fa6b000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 90070013 ffffffff r5:90070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:420:5706 blocked for more than 469 seconds. Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857e5040 r5:00001000 r4:eb819000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:857fa400 r8:857f132c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 dd60: 80230ad4 80239bb0 90070013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:00000000 r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:421:5707 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:421 state:D stack:0 pid:5707 tgid:5707 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec6c9d84 r8:00000002 r7:60000113 r6:ec6c9d8c r5:84f60000 r4:84f60000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f60000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6c9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857e5340 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f60000 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb84d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8573a78c r4:8573a400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8573a78c r4:857f1380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84f60000 r8:857f13ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857f1380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857f1380 r8:8027f5e8 r7:ec6ade60 r6:857eda00 r5:84f60000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6c9fb0 to 0xec6c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857e5080 INFO: task kworker/0:421:5707 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 7ffa8000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 90070013 ffffffff r5:90070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:422:5709 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:422 state:D stack:0 pid:5709 tgid:5709 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec6d1d84 r8:00000002 r7:60000113 r6:ec6d1d8c r5:84f61800 r4:84f61800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f61800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6d1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018005 r8:84f61800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 r5:00001000 r4:eb899000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 Exception stack(0xe884dd28 to 0xe884dd70) r5:80070013 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 r5:84fe9f8c r4:84fe9c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 dfa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:423:5711 blocked for more than 470 seconds. task:kworker/0:423 state:D stack:0 pid:5711 tgid:5711 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:84f63000 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb9d5000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84f63000 r8:857f14ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6d9fb0 to 0xec6d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857e5300 INFO: task kworker/0:423:5711 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 802c2000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:424:5713 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:424 state:D stack:0 pid:5713 tgid:5713 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec6e1d84 r8:00000002 r7:60000113 r6:ec6e1d8c r5:84f62400 r4:84f62400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f62400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6e1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857e56c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f62400 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba05000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8573b38c r4:8573b000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8573b38c r4:857f1500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84f62400 r8:857f152c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857f1500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857f1500 r8:8027f5e8 r7:ec6ade60 r6:857edb80 r5:84f62400 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd20: 806af000 e47a4000 00000001 80239b98 7f1cb000 00000001 r4:00000000 r5:84fe9f8c r4:84fe9c00 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6e5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857e5840 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f63c00 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba2b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8573b78c r4:8573b400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8573b78c r4:857f1580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84f63c00 r8:857f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857f1580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857f1580 r8:8027f5e8 r7:ec6ade60 r6:857edc00 r5:84f63c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6e5fb0 to 0xec6e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857e5640 INFO: task kworker/0:425:5715 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 80b8b000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:426:5719 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:426 state:D stack:0 pid:5719 tgid:5719 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec4df000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:8573c38c r4:857f1600 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r4:00000000 Exception stack(0xe884dd28 to 0xe884dd70) r5:80070013 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:864:5720 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:864 state:D stack:0 pid:5720 tgid:5720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eba35d84 r8:00000002 r7:60000113 r6:eba35d8c r5:84f65400 r4:84f65400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f65400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba35e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857cc400 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84f65400 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec48d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8573bf8c r4:8573bc00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8573bf8c r4:857edc80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84f65400 r8:857edcac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857edc80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857edc80 r8:8027f5e8 r7:ec671e60 r6:857edd80 r5:84f65400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd20: 80edf000 e47a4000 00000001 80239b98 7f1cb000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 r4:8454db00 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:865:5721 blocked for more than 470 seconds. Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ebaad000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd60: 80230ad4 80239bb0 80070013 ffffffff r4:e884ddc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r5:84fe9f8c r4:84fe9c00 r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:866:5724 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:866 state:D stack:0 pid:5724 tgid:5724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec6e9d84 r8:00000002 r7:60000113 r6:ec6e9d8c r5:84f66c00 r4:84f66c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f66c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6e9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857cc040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84f66c00 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebad1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8576eb8c r4:8576e800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8576eb8c r4:857edf00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84f66c00 r8:857edf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857edf00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857edf00 r8:8027f5e8 r7:eba35e60 r6:857edf80 r5:84f66c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6e9fb0 to 0xec6e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857cc000 INFO: task kworker/1:866:5724 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 812a8000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:867:5725 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:867 state:D stack:0 pid:5725 tgid:5725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec6edd84 r8:00000002 r7:60000113 r6:ec6edd8c r5:84f60c00 r4:84f60c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f60c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6ede08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857e5bc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84f60c00 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaf5000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8573bb8c r4:8573b800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8573bb8c r4:857d4000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84f60c00 r8:857d402c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857d4000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857d4000 r8:8027f5e8 r7:eba35e60 r6:857d4080 r5:84f60c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6edfb0 to 0xec6edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857cc000 INFO: task kworker/1:867:5725 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 815c7000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:868:5727 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:868 state:D stack:0 pid:5727 tgid:5727 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec6f5d84 r8:00000002 r7:60000013 r6:ec6f5d8c r5:84f15400 r4:84f15400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f15400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6f5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8566df00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84f15400 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7ad000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8576f38c r4:8576f000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8576f38c r4:857d4100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84f15400 r8:857d412c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857d4100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857d4100 r8:8027f5e8 r7:eba35e60 r6:857d4180 r5:84f15400 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd60: 80230ad4 80239bb0 80070013 ffffffff r4:e884ddc0 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e5aa80 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:857f8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 r5:00001000 r4:eb765000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:857d4200 r8:8027f5e8 r7:ec6f5e60 r6:857d4280 r5:857f8c00 r4:857cc000 Call trace: dd20: 819dd000 e47a4000 00000001 80239b98 7f1cb000 00000001 r4:e884ddc0 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec537000 r5:8573cf8c r4:8573cc00 r10:61c88647 r9:85800000 r8:857f16ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857f1680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857f1680 r8:8027f5e8 r7:ec6ade60 r6:857d4300 r5:85800000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec705fb0 to 0xec705ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857e5e00 INFO: task kworker/0:427:5732 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 819dd000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:428:5734 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:428 state:D stack:0 pid:5734 tgid:5734 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec709d84 r8:00000002 r7:60000113 r6:ec709d8c r5:85801800 r4:85801800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85801800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec709e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857e5900 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85801800 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec51f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8573cb8c r4:8573c800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8573cb8c r4:857f1700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85801800 r8:857f172c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857f1700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857f1700 r8:8027f5e8 r7:ec705e60 r6:857d4380 r5:85801800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec709fb0 to 0xec709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857e5f80 INFO: task kworker/0:428:5734 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) dd20: 81caa000 e47a4000 00000001 80239b98 7f1cb000 00000001 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 INFO: task kworker/0:429:5736 blocked for more than 470 seconds. r10:8291880c r9:ec6f9d84 r8:00000002 r7:60000113 r6:ec6f9d8c r5:857a8c00 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:ec58f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 8236e000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:430:5738 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:430 state:D stack:0 pid:5738 tgid:5738 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec701d84 r8:00000002 r7:60000013 r6:ec701d8c r5:857aa400 r4:857aa400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857aa400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec701e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857e8100 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857aa400 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec549000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8573d38c r4:8573d000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8573d38c r4:857f1880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857aa400 r8:857f18ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857f1880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857f1880 r8:8027f5e8 r7:ec6f9e60 r6:857f1900 r5:857aa400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec701fb0 to 0xec701ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857e81c0 INFO: task kworker/0:430:5738 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 8236e000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:431:5740 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:431 state:D stack:0 pid:5740 tgid:5740 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec70dd84 r8:00000002 r7:60000113 r6:ec70dd8c r5:857ab000 r4:857ab000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857ab000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec70de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857e8280 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857ab000 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec557000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8573d78c r4:8573d400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8573d78c r4:857f1980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857ab000 r8:857f19ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857f1980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfa0: 00000000 00000000 00000000 00000000 r4:857e8080 Workqueue: events bpf_prog_free_deferred r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 r4:8454db00 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:00001000 r4:ec56f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8573db8c r4:857f1a80 r10:61c88647 r9:857abc00 r8:857f1aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857f1a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857f1a80 r8:8027f5e8 r7:ec6f9e60 r6:857f1b00 r5:857abc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6fdfb0 to 0xec6fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857e8080 INFO: task kworker/0:432:5741 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 82b00000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 r4:00000001 r4:84e5aa80 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec5af000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:857f1b80 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r5:80070013 r4:80239bb0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:8291880c r9:ec719d84 r8:00000002 r7:60000013 r6:ec719d8c r5:857ad400 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ec721000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8573e78c r4:857f1c80 r10:61c88647 r9:857ad400 r8:857f1cac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xec719fb0 to 0xec719ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857e84c0 INFO: task kworker/0:434:5746 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 82f8f000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:435:5749 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:435 state:D stack:0 pid:5749 tgid:5749 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec725d84 r8:00000002 r7:60000113 r6:ec725d8c r5:857ae000 r4:857ae000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857ae000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec725e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857e8a40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857ae000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec72d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8573eb8c r4:8573e800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8573eb8c r4:857f1d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857ae000 r8:857f1dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857f1d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857f1d80 r8:8027f5e8 r7:ec719e60 r6:857f1e00 r5:857ae000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec725fb0 to 0xec725ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857e8780 INFO: task kworker/0:435:5749 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 83397000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:436:5751 blocked for more than 470 seconds. Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec74de08 r5:00001000 r4:ec739000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xec74dfb0 to 0xec74dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82ac11a4 r4:e884ddc0 r4:00000000 r5:00001000 r4:e884f000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:437:5752 blocked for more than 470 seconds. Workqueue: events bpf_prog_free_deferred r4:85805400 [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec751e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857e8e40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85805400 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec759000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8573f78c r4:8573f400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8573f78c r4:857f1f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85805400 r8:857f1f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857f1f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857f1f00 r8:8027f5e8 r7:ec74de60 r6:857d4480 r5:85805400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec751fb0 to 0xec751ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857e88c0 INFO: task kworker/0:437:5752 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 833db000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:438:5755 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:438 state:D stack:0 pid:5755 tgid:5755 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85803000 r4:82918808 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:ec745000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85803000 r8:857f1fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857e8bc0 Workqueue: events bpf_prog_free_deferred dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e5aa80 Call trace: [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:00001000 r4:dfa83000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8573fb8c r4:8573f800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8573fb8c r4:857bf000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85802400 r8:857bf02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857bf000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857bf000 r8:8027f5e8 r7:ec751e60 r6:857d4580 r5:85802400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec775fb0 to 0xec775ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857b8500 INFO: task kworker/0:439:5764 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 839ab000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:440:5766 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:440 state:D stack:0 pid:5766 tgid:5766 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec779d84 r8:00000002 r7:60000113 r6:ec779d8c r5:85803c00 r4:85803c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85803c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec779e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857e5740 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85803c00 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 r5:00001000 r4:dfb91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8573ff8c r4:8573fc00 r7:dddced80 r6:83018000 r5:8573ff8c r4:857bf080 Exception stack(0xec779fb0 to 0xec779ff8) r4:857b8500 Workqueue: events bpf_prog_free_deferred dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:441:5767 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:441 state:D stack:0 pid:5767 tgid:5767 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec77dd84 r8:00000002 r7:60000113 r6:ec77dd8c r5:85806c00 r4:85806c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85806c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec77de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857b8040 r5:00001000 r4:e06d1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8587038c r4:857bf100 Exception stack(0xec77dfb0 to 0xec77dff8) task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80070013 r4:80239bb0 r4:00000000 r5:84fe9f8c r4:84fe9c00 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e5aa80 task:kworker/0:442 state:D stack:0 pid:5769 tgid:5769 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:eac43000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85808000 r8:857bf1ac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:443:5770 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:443 state:D stack:0 pid:5770 tgid:5770 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec789d84 r8:00000002 r7:60000113 r6:ec789d8c r5:85808c00 r4:85808c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85808c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec789e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857b8380 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85808c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae23000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85870b8c r4:85870800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85870b8c r4:857bf200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85808c00 r8:857bf22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857bf200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857bf200 r8:8027f5e8 r7:ec785e60 r6:857d4780 r5:85808c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec789fb0 to 0xec789ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:e884ddc0 r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e5aa80 task:kworker/0:444 state:D stack:0 pid:5771 tgid:5771 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb135000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85870f8c r4:857bf280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85809800 r8:857bf2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857bf280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857bf280 r8:8027f5e8 r7:ec789e60 r6:857d4800 r5:85809800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec78dfb0 to 0xec78dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857b8840 INFO: task kworker/0:444:5771 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 8425a000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb25d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xec791fb0 to 0xec791ff8) r4:857b8840 Workqueue: events bpf_prog_free_deferred [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:84fe9f8c r4:84fe9c00 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:446:5773 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:446 state:D stack:0 pid:5773 tgid:5773 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec795d84 r8:00000002 r7:60000113 r6:ec795d8c r5:8580b000 r4:8580b000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8580b000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec795e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857b8680 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8580b000 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb38d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8587178c r4:85871400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8587178c r4:857bf380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8580b000 r8:857bf3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857bf380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857bf380 r8:8027f5e8 r7:ec791e60 r6:857d4900 r5:8580b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec795fb0 to 0xec795ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857b8840 INFO: task kworker/0:446:5773 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 844fe000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 r5:84fe9f8c r4:84fe9c00 r4:8454db00 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:447:5774 blocked for more than 470 seconds. r4:8580bc00 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec799e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857b8780 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8580bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3eb000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85871b8c r4:85871800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85871b8c r4:857bf400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8580bc00 r8:857bf42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857bf400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857bf400 r8:8027f5e8 r7:ec795e60 r6:857d4980 r5:8580bc00 Exception stack(0xec799fb0 to 0xec799ff8) Workqueue: events bpf_prog_free_deferred Exception stack(0xe884dd28 to 0xe884dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r5:84fe9f8c r4:84fe9c00 r4:8454db00 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec79de08 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb591000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8580c800 r8:857bf4ac r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 84b45000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:449:5776 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:449 state:D stack:0 pid:5776 tgid:5776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec7a1d84 r8:00000002 r7:60000113 r6:ec7a1d8c r5:8580d400 r4:8580d400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8580d400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7a1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858567c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8580d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0df000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9ff000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85905b8c r4:85905800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:857bf500 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:84e5aa80 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:8580e000 r4:82918808 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:eb787000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8587238c r4:85872000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8587238c r4:857bf580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8580e000 r8:857bf5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857bf580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857bf580 r8:8027f5e8 r7:ec7a1e60 r6:857d4b00 r5:8580e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec781fb0 to 0xec781ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857b8840 INFO: task kworker/0:450:5777 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 8522b000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 r4:e884ddc0 r5:00001000 r4:e884f000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec471000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8587278c r4:85872400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8587278c r4:857bf600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8580ec00 r8:857bf62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857bf600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857bf600 r8:8027f5e8 r7:ec7a1e60 r6:857d4b80 r5:8580ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7adfb0 to 0xec7adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857b8b00 INFO: task kworker/0:451:5781 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 8539a000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7b1e08 r4:00000000 r5:00001000 r4:eb93d000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:857d4c00 Exception stack(0xec7b1fb0 to 0xec7b1ff8) task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80070013 r4:80239bb0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:eb7d3000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8576f78c r4:857d4d00 r4:857d4d00 Exception stack(0xec73dfb0 to 0xec73dff8) r4:8560e000 Call trace: Exception stack(0xe884dd28 to 0xe884dd70) r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:872:5788 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:872 state:D stack:0 pid:5788 tgid:5788 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec7bdd84 r8:00000002 r7:60000013 r6:ec7bdd8c r5:857a9800 r4:857a9800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857a9800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7bde08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8560e400 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:857a9800 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb33000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8576ff8c r4:8576fc00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8576ff8c r4:857d4d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857a9800 r8:857d4dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857d4d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857d4d80 r8:8027f5e8 r7:ec7b1e60 r6:857bf700 r5:857a9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7bdfb0 to 0xec7bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8560e140 INFO: task kworker/1:872:5788 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 859fc000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:873:5789 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:873 state:D stack:0 pid:5789 tgid:5789 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec7c1d84 r8:00000002 r7:60000113 r6:ec7c1d8c r5:857a8000 r4:857a8000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857a8000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7c1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8560e940 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:857a8000 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec3e3000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858e8f8c r4:858e8c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858e8f8c r4:857d4e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857a8000 r8:857d4e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857d4e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857d4e00 r8:8027f5e8 r7:ec7bde60 r6:857bf780 r5:857a8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7c1fb0 to 0xec7c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8560e280 INFO: task kworker/1:873:5789 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 85e1a000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:874:5791 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:874 state:D stack:0 pid:5791 tgid:5791 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec7c9d84 r8:00000002 r7:60000113 r6:ec7c9d8c r5:84e60000 r4:84e60000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e60000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7c9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8560e540 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84e60000 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec389000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858e838c r4:858e8000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858e838c r4:857d4e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e60000 r8:857d4eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857d4e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857d4e80 r8:8027f5e8 r7:ec7c1e60 r6:857bf800 r5:84e60000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7c9fb0 to 0xec7c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8560e480 INFO: task kworker/1:874:5791 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 86573000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:875:5793 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:875 state:D stack:0 pid:5793 tgid:5793 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec7d1d84 r8:00000002 r7:60000113 r6:ec7d1d8c r5:84e61800 r4:84e61800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e61800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7d1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8560e6c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84e61800 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec3a3000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858e878c r4:858e8400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858e878c r4:857d4f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e61800 r8:857d4f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857d4f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857d4f00 r8:8027f5e8 r7:ec7c1e60 r6:857bf880 r5:84e61800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7d1fb0 to 0xec7d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8560e3c0 INFO: task kworker/1:875:5793 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 86573000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:876:5794 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:876 state:D stack:0 pid:5794 tgid:5794 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec7d5d84 r8:00000002 r7:60000113 r6:ec7d5d8c r5:84e62400 r4:84e62400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e62400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7d5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8560e840 r5:00001000 r4:ec3b5000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858e8b8c r4:858e8800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84e62400 r8:857d4fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xec7d5fb0 to 0xec7d5ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd20: 867b0000 e47a4000 00000001 80239b98 7f1cb000 00000001 r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:877:5797 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:877 state:D stack:0 pid:5797 tgid:5797 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec7e1d84 r8:00000002 r7:60000013 r6:ec7e1d8c r5:84e64800 r4:84e64800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e64800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7e1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8560efc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84e64800 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec447000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe884dd28 to 0xe884dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:8291880c r9:ec7e5d84 r8:00000002 r7:60000013 r6:ec7e5d8c r5:84e63000 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ec3ef000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e63000 r8:8567a0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8567a080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8567a080 r8:8027f5e8 r7:ec7e1e60 r6:857bfa00 r5:84e63000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7e5fb0 to 0xec7e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8560e7c0 INFO: task kworker/1:878:5798 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 87050000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) Workqueue: events bpf_prog_free_deferred r4:00000000 r5:00001000 r4:ec407000 Exception stack(0xec7edfb0 to 0xec7edff8) dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 Not tainted 6.15.0-syzkaller #0 Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec7f9d84 r8:00000002 r7:60000013 r6:ec7f9d8c r5:84e65400 r4:84e65400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e65400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7f9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8560ed00 r5:00001000 r4:ec41d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:858e9b8c r4:8567a180 9fa0: 00000000 00000000 00000000 00000000 Call trace: dd20: 87050000 e47a4000 00000001 80239b98 7f1cb000 00000001 r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec42f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:858e9f8c r4:8567a200 Exception stack(0xec7fdfb0 to 0xec7fdff8) task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 874da000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:882:5807 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:882 state:D stack:0 pid:5807 tgid:5807 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec801d84 r8:00000002 r7:60000113 r6:ec801d8c r5:84e66c00 r4:84e66c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e66c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec801e08 r5:00001000 r4:ec489000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84e66c00 r8:8567a2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857ccb00 Workqueue: events bpf_prog_free_deferred dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 r4:00000000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e66000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec805e08 r5:00001000 r4:ec457000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:858ea78c r4:8567a300 5fa0: 00000000 00000000 00000000 00000000 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:884:5811 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:884 state:D stack:0 pid:5811 tgid:5811 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec7e9d84 r8:00000002 r7:60000013 r6:ec7e9d8c r5:847c6000 r4:847c6000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847c6000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7e9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ba3c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847c6000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec60d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858eb38c r4:858eb000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858eb38c r4:8567a380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847c6000 r8:8567a3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8567a380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8567a380 r8:8027f5e8 r7:ec801e60 r6:857bfd00 r5:847c6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7e9fb0 to 0xec7e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8560ef00 INFO: task kworker/1:884:5811 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 87e86000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 r5:00001000 r4:e884f000 r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:885:5814 blocked for more than 471 seconds. Workqueue: events bpf_prog_free_deferred r10:8291880c r9:ec811d84 r8:00000002 r7:60000113 r6:ec811d8c r5:84f68c00 [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5c9000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858eaf8c r4:858eac00 r7:ddde2d80 r6:83018200 r5:858eaf8c r4:8567a400 r10:61c88647 r9:84f68c00 r8:8567a42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 87e86000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:886:5816 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:886 state:D stack:0 pid:5816 tgid:5816 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec819d84 r8:00000002 r7:60000113 r6:ec819d8c r5:84f68000 r4:84f68000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f68000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec819e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857b8cc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84f68000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec881000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858edb8c r4:858ed800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858edb8c r4:8567a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84f68000 r8:8567a4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8567a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8567a480 r8:8027f5e8 r7:ec7e9e60 r6:857bfe00 r5:84f68000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec819fb0 to 0xec819ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857ba240 INFO: task kworker/1:886:5816 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 88518000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:887:5817 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:887 state:D stack:0 pid:5817 tgid:5817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec81dd84 r8:00000002 r7:60000113 r6:ec81dd8c r5:84f6a400 r4:84f6a400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f6a400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec81de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ba500 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84f6a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec625000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858eb78c r4:858eb400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858eb78c r4:8567a500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84f6a400 r8:8567a52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8567a500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8567a500 r8:8027f5e8 r7:ec819e60 r6:857bfe80 r5:84f6a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec81dfb0 to 0xec81dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857ba240 INFO: task kworker/1:887:5817 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 88b61000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:84fe9f8c r4:84fe9c00 r4:8454db00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec825e08 r5:00001000 r4:ec639000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:858ebb8c r4:858eb800 r10:61c88647 r9:84f6bc00 r8:8567a62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:82ac11a4 r4:00000000 r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:889:5821 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:889 state:D stack:0 pid:5821 tgid:5821 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec82dd84 r8:00000002 r7:60000013 r6:ec82dd8c r5:84f6c800 r4:84f6c800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f6c800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec82de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ba7c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84f6c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec64d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858ebf8c r4:858ebc00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858ebf8c r4:8567a580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84f6c800 r8:8567a5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8567a580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8567a580 r8:8027f5e8 r7:ec819e60 r6:857bff80 r5:84f6c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec82dfb0 to 0xec82dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857ba480 INFO: task kworker/1:889:5821 is blocked on a mutex likely owned by task kworker/1:174:3878. Workqueue: events bpf_prog_free_deferred [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) Exception stack(0xe884dfb0 to 0xe884dff8) r4:84f6d400 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec67b000 r5:858ec38c r4:858ec000 r10:61c88647 r9:84f6d400 r8:8567a6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857ba640 Call trace: Exception stack(0xe884dd28 to 0xe884dd70) [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 INFO: task kworker/1:891:5825 blocked for more than 471 seconds. r4:84f6b000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f6b000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec83de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ba780 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84f6b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec69d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858ec78c r4:858ec400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858ec78c r4:8567a700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84f6b000 r8:8567a72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8567a700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8567a700 r8:8027f5e8 r7:ec819e60 r6:857df080 r5:84f6b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec83dfb0 to 0xec83dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857ba980 INFO: task kworker/1:891:5825 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 8965f000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:452:5827 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:452 state:D stack:0 pid:5827 tgid:5827 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec845d84 r8:00000002 r7:60000113 r6:ec845d8c r5:84f6ec00 r4:84f6ec00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f6ec00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec845e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:ec8d5000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85872b8c r4:85872800 r10:61c88647 r9:84f6ec00 r8:857df12c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xec845fb0 to 0xec845ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:84f6e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000 r5:00001000 r4:ec765000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858ecb8c r4:858ec800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858ecb8c r4:8567a780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84f6e000 r8:8567a7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8567a780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8567a780 r8:8027f5e8 r7:ec819e60 r6:857df200 r5:84f6e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec84dfb0 to 0xec84dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857baa80 INFO: task kworker/1:892:5828 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 8987a000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:893:5830 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:893 state:D stack:0 pid:5830 tgid:5830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec861d84 r8:00000002 r7:60000013 r6:ec861d8c r5:84f69800 r4:84f69800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f69800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec861e08 r4:00000000 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ec851000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:858ecf8c r4:8567a800 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80070013 r4:80239bb0 r4:e884ddc0 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:894:5832 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:894 state:D stack:0 pid:5832 tgid:5832 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec871d84 r8:00000002 r7:60000113 r6:ec871d8c r5:858b8c00 r4:858b8c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858b8c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec871e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857bad40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858b8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec85d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858ed38c r4:858ed000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858ed38c r4:8567a880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858b8c00 r8:8567a8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8567a880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8567a880 r8:8027f5e8 r7:ec819e60 r6:857df300 r5:858b8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec871fb0 to 0xec871ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857bad00 INFO: task kworker/1:894:5832 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:858ba400 r4:82918808 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ec86d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:858ed78c r4:8567a900 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 r5:00001000 r4:e884f000 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:858b9800 r7:00000000 r6:83018200 r5:00001000 r4:7f0cb000 r5:00001000 r4:ec8bd000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857bae00 INFO: task kworker/1:896:5836 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 89bf4000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:897:5839 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:897 state:D stack:0 pid:5839 tgid:5839 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec8a5d84 r8:00000002 r7:60000113 r6:ec8a5d8c r5:858b8000 r4:858b8000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858b8000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8a5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8560ed80 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858b8000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec891000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858edf8c r4:858edc00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858edf8c r4:8567aa00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec89d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:858ee38c r4:8567aa80 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80070013 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:899:5843 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:899 state:D stack:0 pid:5843 tgid:5843 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec8c5d84 r8:00000002 r7:60000113 r6:ec8c5d8c r5:858be000 r4:858be000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858be000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8c5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857eb300 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858be000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8ad000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858ee78c r4:858ee400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858ee78c r4:8567ab00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858be000 r8:8567ab2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8567ab00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8567ab00 r8:8027f5e8 r7:ec889e60 r6:857df580 r5:858be000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8c5fb0 to 0xec8c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857eb000 INFO: task kworker/1:899:5843 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 8ac78000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe884dfb0 to 0xe884dff8) Not tainted 6.15.0-syzkaller #0 r4:858bc800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8d9e08 r5:00001000 r4:dfb07000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd20: 8ac78000 e47a4000 00000001 80239b98 7f1cb000 00000001 r4:00000000 r5:84fe9f8c r4:84fe9c00 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:901:5847 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:901 state:D stack:0 pid:5847 tgid:5847 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec8ddd84 r8:00000002 r7:60000013 r6:ec8ddd8c r5:858bbc00 r4:858bbc00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858bbc00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8dde08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857eb5c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858bbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0cd000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8cd000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858eef8c r4:858eec00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858eef8c r4:8567ac00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858bbc00 r8:8567ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8567ac00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8567ac00 r8:8027f5e8 r7:ec8d9e60 r6:857df680 r5:858bbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8ddfb0 to 0xec8ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857eb2c0 INFO: task kworker/1:901:5847 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd60: 80230ad4 80239bb0 80070013 ffffffff r4:e884ddc0 r5:00001000 r4:e884f000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec8e5000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:858ef38c r4:8567ac80 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd20: 8aebf000 e47a4000 00000001 80239b98 7f1cb000 00000001 r4:00000000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:8291880c r9:ec8b1d84 r8:00000002 r7:60000113 r6:ec8b1d8c r5:858bd400 r4:00000000 r9:83018005 r8:858bd400 r7:00000000 r6:83018000 r5:00001000 r4:7f0db000 r5:00001000 r4:ec9eb000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8590578c r4:85905400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8590578c r4:857df780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858bd400 r8:857df7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857df780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857df780 r8:8027f5e8 r7:ec7a1e60 r6:857df800 r5:858bd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8b1fb0 to 0xec8b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85836140 INFO: task kworker/0:453:5850 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 8b378000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Not tainted 6.15.0-syzkaller #0 [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec8f1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11a4 r4:00000000 r5:84fe9f8c r4:84fe9c00 r4:8454db00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec731e08 r5:00001000 r4:eaf2d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe884dd28 to 0xe884dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:905:5858 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:905 state:D stack:0 pid:5858 tgid:5858 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec8c1d84 r8:00000002 r7:60000013 r6:ec8c1d8c r5:858c0c00 r4:858c0c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858c0c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8c1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ebb80 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858c0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaafb000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858eff8c r4:858efc00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858eff8c r4:8567ae00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858c0c00 r8:8567ae2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8567ae00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8567ae00 r8:8027f5e8 r7:ec731e60 r6:857df980 r5:858c0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8c1fb0 to 0xec8c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857eb8c0 INFO: task kworker/1:905:5858 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 8b88e000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 r4:e884ddc0 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 INFO: task kworker/1:906:5860 blocked for more than 471 seconds. r4:858c2400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec901e08 r5:00001000 r4:eb2b7000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:858f078c r4:858f0400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858f078c r4:8567ae80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858c2400 r8:8567aeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8567ae80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8567ae80 r8:8027f5e8 r7:ec731e60 r6:857dfa00 r5:858c2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec901fb0 to 0xec901ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857ebd80 INFO: task kworker/1:906:5860 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 8b88e000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb441000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85810c00 r8:8567af2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe884dfb0 to 0xe884dff8) Not tainted 6.15.0-syzkaller #0 r4:85811800 r4:00000000 r9:83018205 r8:85811800 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 r5:00001000 r4:eb551000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:909:5866 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:909 state:D stack:0 pid:5866 tgid:5866 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec8fdd84 r8:00000002 r7:60000013 r6:ec8fdd8c r5:85813000 r4:85813000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85813000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8fde08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857eb940 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85813000 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4e1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858f0f8c r4:858f0c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858f0f8c r4:857f2100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85813000 r8:857f212c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857f2100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857f2100 r8:8027f5e8 r7:ec909e60 r6:857f2180 r5:85813000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8fdfb0 to 0xec8fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857ebd00 INFO: task kworker/1:909:5866 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 8c067000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r4:82ac11a4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec90de08 r5:00001000 r4:eb607000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:858f178c r4:857f2200 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8454db00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:911 state:D stack:0 pid:5870 tgid:5870 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec911d84 r8:00000002 r7:60000013 r6:ec911d8c r5:85814800 r4:85814800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85814800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec911e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85832280 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85814800 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb68d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858f1b8c r4:858f1800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858f1b8c r4:857f2300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85814800 r8:857f232c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857f2300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857f2300 r8:8027f5e8 r7:ec90de60 r6:857f2380 r5:85814800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec911fb0 to 0xec911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:858321c0 INFO: task kworker/1:911:5870 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 8c4a7000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 INFO: task kworker/1:912:5872 blocked for more than 471 seconds. r4:858c1800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec91de08 r5:00001000 r4:eb87d000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:8291880c r9:ec929d84 r8:00000002 r7:60000113 r6:ec929d8c r5:858c3c00 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb829000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85832340 INFO: task kworker/1:913:5875 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 8c5cd000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:914:5877 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:914 state:D stack:0 pid:5877 tgid:5877 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec931d84 r8:00000002 r7:60000013 r6:ec931d8c r5:858c6000 r4:858c6000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858c6000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec931e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85832840 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858c6000 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba0d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858f2b8c r4:858f2800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858f2b8c r4:857f2500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd20: 8c5cd000 e47a4000 00000001 80239b98 7f1cb000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb9cf000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:916:5881 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:916 state:D stack:0 pid:5881 tgid:5881 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec93dd84 r8:00000002 r7:60000013 r6:ec93dd8c r5:858c3000 r4:858c3000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858c3000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec93de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85832e00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858c3000 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaed000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858f3b8c r4:858f3800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858f3b8c r4:857f2600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858c3000 r8:857f262c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857f2600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857f2600 r8:8027f5e8 r7:ec931e60 r6:857dfc80 r5:858c3000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11a4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:917:5882 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Call trace: [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eba4d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:858f2f8c r4:858f2c00 r10:61c88647 r9:858c5400 r8:857f26ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eba85000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:858f338c r4:857f2700 dfa0: 00000000 00000000 00000000 00000000 [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11a4 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:919:5885 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:919 state:D stack:0 pid:5885 tgid:5885 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec915d84 r8:00000002 r7:60000013 r6:ec915d8c r5:85815400 r4:85815400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85815400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec915e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85832c80 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85815400 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebab5000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858f378c r4:858f3400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858f378c r4:857f2800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85815400 r8:857f282c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857f2800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857f2800 r8:8027f5e8 r7:ec93de60 r6:857f2880 r5:85815400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec915fb0 to 0xec915ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r5:85816c00 r4:82918808 r4:00000000 r4:00000000 r5:00001000 r4:ebb0d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:858f3f8c r4:857f2900 r4:85832c00 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r4:85812400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85812400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec945e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85846040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85812400 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec4e1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858f838c r4:858f8000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858f838c r4:857f2a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85812400 r8:857f2a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857f2a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857f2a00 r8:8027f5e8 r7:ec919e60 r6:857f2a80 r5:85812400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec945fb0 to 0xec945ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85846080 INFO: task kworker/1:921:5890 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 8e050000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:922:5891 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec94de08 r5:00001000 r4:ec505000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85818000 r8:857f2b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 dd20: 8e050000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:923:5894 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:923 state:D stack:0 pid:5894 tgid:5894 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec951d84 r8:00000002 r7:60000013 r6:ec951d8c r5:85819800 r4:85819800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85819800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec951e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85846740 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85819800 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec521000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858f8b8c r4:858f8800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858f8b8c r4:857f2c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85819800 r8:857f2c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857f2c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857f2c00 r8:8027f5e8 r7:ec94de60 r6:857f2c80 r5:85819800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec951fb0 to 0xec951ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85846080 INFO: task kworker/1:923:5894 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 8ecc4000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:924:5897 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r10:8291880c r9:ec949d84 r8:00000002 r7:60000013 r6:ec949d8c r5:8581a400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec949e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858469c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8581a400 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec54b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858f938c r4:858f9000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858f938c r4:857f2d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8581a400 r8:857f2d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857f2d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857f2d00 r8:8027f5e8 r7:ec951e60 r6:857f2d80 r5:8581a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec949fb0 to 0xec949ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:858465c0 INFO: task kworker/1:924:5897 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 8ecc4000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:925:5898 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:925 state:D stack:0 pid:5898 tgid:5898 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec959d84 r8:00000002 r7:60000013 r6:ec959d8c r5:8581b000 r4:8581b000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8581b000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec959e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85846800 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8581b000 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec52f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858f8f8c r4:858f8c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858f8f8c r4:857f2e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8581b000 r8:857f2e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857f2e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857f2e00 r8:8027f5e8 r7:ec949e60 r6:857f2e80 r5:8581b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec959fb0 to 0xec959ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85846680 INFO: task kworker/1:925:5898 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 8f2c6000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:926:5900 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:926 state:D stack:0 pid:5900 tgid:5900 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec955d84 r8:00000002 r7:60000013 r6:ec955d8c r5:8581bc00 r4:8581bc00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8581bc00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec955e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858461c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8581bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6c1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858fa38c r4:858fa000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858fa38c r4:857f2f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8581bc00 r8:857f2f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857f2f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857f2f00 r8:8027f5e8 r7:ec949e60 r6:857f2f80 r5:8581bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec955fb0 to 0xec955ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85846840 INFO: task kworker/1:926:5900 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 8f2c6000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:927:5902 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:927 state:D stack:0 pid:5902 tgid:5902 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec95dd84 r8:00000002 r7:60000013 r6:ec95dd8c r5:8581c800 r4:8581c800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8581c800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec95de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85846b80 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8581c800 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec561000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858f978c r4:858f9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858f978c r4:8584c000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8581c800 r8:8584c02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8584c000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8584c000 r8:8027f5e8 r7:ec955e60 r6:8584c080 r5:8581c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec95dfb0 to 0xec95dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85846bc0 INFO: task kworker/1:927:5902 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 8f587000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:928:5904 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:928 state:D stack:0 pid:5904 tgid:5904 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec961d84 r8:00000002 r7:60000113 r6:ec961d8c r5:8581d400 r4:8581d400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8581d400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec961e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85846c80 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8581d400 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec57b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858f9b8c r4:858f9800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858f9b8c r4:8584c100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8581d400 r8:8584c12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8584c100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8584c100 r8:8027f5e8 r7:ec955e60 r6:8584c180 r5:8581d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec961fb0 to 0xec961ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85846bc0 INFO: task kworker/1:928:5904 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 8f587000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:929:5905 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:929 state:D stack:0 pid:5905 tgid:5905 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec965d84 r8:00000002 r7:60000013 r6:ec965d8c r5:8581e000 r4:8581e000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8581e000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec965e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85846e40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8581e000 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6a3000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858f9f8c r4:858f9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858f9f8c r4:8584c200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8581e000 r8:8584c22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8584c200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8584c200 r8:8027f5e8 r7:ec955e60 r6:8584c280 r5:8581e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec965fb0 to 0xec965ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85846d80 INFO: task kworker/1:929:5905 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 8f95c000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:930:5908 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:930 state:D stack:0 pid:5908 tgid:5908 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec969d84 r8:00000002 r7:60000113 r6:ec969d8c r5:8581ec00 r4:8581ec00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8581ec00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec969e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85836cc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8581ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6d5000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858fa78c r4:858fa400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858fa78c r4:8584c300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8581ec00 r8:8584c32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8584c300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8584c300 r8:8027f5e8 r7:ec955e60 r6:8584c380 r5:8581ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec969fb0 to 0xec969ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85836c40 INFO: task kworker/1:930:5908 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 8ff31000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:931:5911 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:931 state:D stack:0 pid:5911 tgid:5911 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec971d84 r8:00000002 r7:60000113 r6:ec971d8c r5:85818c00 r4:85818c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85818c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec971e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85832fc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85818c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec727000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858fab8c r4:858fa800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858fab8c r4:8584c400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85818c00 r8:8584c42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8584c400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8584c400 r8:8027f5e8 r7:ec969e60 r6:8584c480 r5:85818c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec971fb0 to 0xec971ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85832f80 INFO: task kworker/1:931:5911 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 8ff31000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:932:5913 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:932 state:D stack:0 pid:5913 tgid:5913 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec975d84 r8:00000002 r7:60000113 r6:ec975d8c r5:85800c00 r4:85800c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85800c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec975e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8585a040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85800c00 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec735000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858faf8c r4:858fac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858faf8c r4:8584c500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85800c00 r8:8584c52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8584c500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8584c500 r8:8027f5e8 r7:ec971e60 r6:8584c580 r5:85800c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec975fb0 to 0xec975ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8585a080 INFO: task kworker/1:932:5913 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 90321000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:933:5914 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:933 state:D stack:0 pid:5914 tgid:5914 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec96dd84 r8:00000002 r7:60000113 r6:ec96dd8c r5:85810000 r4:85810000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85810000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec96de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8585a3c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85810000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec743000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858fb38c r4:858fb000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858fb38c r4:8584c600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85810000 r8:8584c62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8584c600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8584c600 r8:8027f5e8 r7:ec975e60 r6:8584c680 r5:85810000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec96dfb0 to 0xec96dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8585a080 INFO: task kworker/1:933:5914 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 90321000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:934:5916 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:934 state:D stack:0 pid:5916 tgid:5916 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec97dd84 r8:00000002 r7:60000113 r6:ec97dd8c r5:858d0000 r4:858d0000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858d0000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec97de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8585a540 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858d0000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec75f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858fb78c r4:858fb400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858fb78c r4:8584c700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858d0000 r8:8584c72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8584c700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8584c700 r8:8027f5e8 r7:ec96de60 r6:857dfd80 r5:858d0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec97dfb0 to 0xec97dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8585a240 INFO: task kworker/1:934:5916 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 90918000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:935:5919 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:935 state:D stack:0 pid:5919 tgid:5919 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec991d84 r8:00000002 r7:60000013 r6:ec991d8c r5:858d3000 r4:858d3000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858d3000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec991e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8585a640 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec983000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858fbb8c r4:858fb800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858fbb8c r4:8584c780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858d3000 r8:8584c7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8584c780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8584c780 r8:8027f5e8 r7:ec97de60 r6:857dfe00 r5:858d3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec991fb0 to 0xec991ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8585a340 INFO: task kworker/1:935:5919 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 90918000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:936:5920 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:936 state:D stack:0 pid:5920 tgid:5920 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec995d84 r8:00000002 r7:60000013 r6:ec995d8c r5:858d0c00 r4:858d0c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858d0c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec995e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8585aa40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858d0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9b7000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8590478c r4:85904400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8590478c r4:8584c800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858d0c00 r8:8584c82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8584c800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8584c800 r8:8027f5e8 r7:ec991e60 r6:857dfe80 r5:858d0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec995fb0 to 0xec995ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8585a440 INFO: task kworker/1:936:5920 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 90d10000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:937:5922 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:937 state:D stack:0 pid:5922 tgid:5922 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec9a5d84 r8:00000002 r7:60000113 r6:ec9a5d8c r5:858d4800 r4:858d4800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858d4800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9a5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8585a7c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858d4800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec997000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858fbf8c r4:858fbc00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858fbf8c r4:8584c880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858d4800 r8:8584c8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8584c880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8584c880 r8:8027f5e8 r7:ec995e60 r6:857dff00 r5:858d4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9a5fb0 to 0xec9a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8585a440 INFO: task kworker/1:937:5922 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 90d10000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:938 state:D stack:0 pid:5923 tgid:5923 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec9a9d84 r8:00000002 r7:60000113 r6:ec9a9d8c r5:858d5400 r4:858d5400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858d5400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9a9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8585a940 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9ab000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8590438c r4:85904000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8590438c r4:8584c900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858d5400 r8:8584c92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8584c900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8584c900 r8:8027f5e8 r7:ec995e60 r6:857dff80 r5:858d5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9a9fb0 to 0xec9a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8585a5c0 INFO: task kworker/1:938:5923 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 911ed000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:939:5926 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:939 state:D stack:0 pid:5926 tgid:5926 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec9c5d84 r8:00000002 r7:60000013 r6:ec9c5d8c r5:858d3c00 r4:858d3c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858d3c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9c5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8585ab40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858d3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9c7000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85904b8c r4:85904800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85904b8c r4:8584c980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858d3c00 r8:8584c9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8584c980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8584c980 r8:8027f5e8 r7:ec995e60 r6:8586c000 r5:858d3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9c5fb0 to 0xec9c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8585a740 INFO: task kworker/1:939:5926 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 911ed000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:940:5928 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:940 state:D stack:0 pid:5928 tgid:5928 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec979d84 r8:00000002 r7:60000013 r6:ec979d8c r5:85820c00 r4:85820c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85820c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec979e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85868400 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85820c00 r7:00000000 r6:83018200 r5:00001000 r4:7f027000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaaf000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85905f8c r4:85905c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85905f8c r4:8584ca00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85820c00 r8:8584ca2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8584ca00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8584ca00 r8:8027f5e8 r7:ec9c5e60 r6:8584ca80 r5:85820c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec979fb0 to 0xec979ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8585a740 INFO: task kworker/1:940:5928 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 911ed000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:941:5929 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:941 state:D stack:0 pid:5929 tgid:5929 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec981d84 r8:00000002 r7:60000113 r6:ec981d8c r5:85821800 r4:85821800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85821800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec981e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8585ac80 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85821800 r7:00000000 r6:83018200 r5:00001000 r4:7f0d7000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9d3000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85904f8c r4:85904c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85904f8c r4:8584cb00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85821800 r8:8584cb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8584cb00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8584cb00 r8:8027f5e8 r7:ec979e60 r6:8584cb80 r5:85821800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec981fb0 to 0xec981ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8585a740 INFO: task kworker/1:941:5929 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 91b74000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 r4:8454db00 r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:942:5932 blocked for more than 472 seconds. task:kworker/1:942 state:D stack:0 pid:5932 tgid:5932 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:85823000 [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85823000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9df000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8590538c r4:85905000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8590538c r4:8584cc00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85823000 r8:8584cc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8584cc00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8584cc00 r8:8027f5e8 r7:ec979e60 r6:8584cc80 r5:85823000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9ddfb0 to 0xec9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8585acc0 INFO: task kworker/1:942:5932 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 91b74000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:943:5933 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:943 state:D stack:0 pid:5933 tgid:5933 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec9e9d84 r8:00000002 r7:60000113 r6:ec9e9d8c r5:858d6c00 r4:858d6c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858d6c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9e9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85856b00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0dd000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9f7000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8587338c r4:85873000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8587338c r4:8584cd00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858d6c00 r8:8584cd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8584cd00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8584cd00 r8:8027f5e8 r7:ec979e60 r6:8586c080 r5:858d6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9e9fb0 to 0xec9e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8585acc0 INFO: task kworker/1:943:5933 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 91e9f000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:944:5936 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:944 state:D stack:0 pid:5936 tgid:5936 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec9d1d84 r8:00000002 r7:60000013 r6:ec9d1d8c r5:858d6000 r4:858d6000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858d6000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9d1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85868640 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858d6000 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac05000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8590678c r4:85906400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8590678c r4:8584cd80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858d6000 r8:8584cdac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8584cd80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8584cd80 r8:8027f5e8 r7:ec979e60 r6:8586c100 r5:858d6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9d1fb0 to 0xec9d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857bb7c0 INFO: task kworker/1:944:5936 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 91e9f000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:454:5938 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:454 state:D stack:0 pid:5938 tgid:5938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec9f5d84 r8:00000002 r7:60000013 r6:ec9f5d8c r5:858d2400 r4:858d2400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858d2400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9f5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85856580 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:858d2400 r7:00000000 r6:83018000 r5:00001000 r4:7f0e1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca0b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8587378c r4:85873400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8587378c r4:8586c180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858d2400 r8:8586c1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8586c180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8586c180 r8:8027f5e8 r7:ec7a1e60 r6:8586c200 r5:858d2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9f5fb0 to 0xec9f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85856d00 INFO: task kworker/0:454:5938 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 92408000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:455:5940 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:455 state:D stack:0 pid:5940 tgid:5940 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eca09d84 r8:00000002 r7:60000113 r6:eca09d8c r5:858d1800 r4:858d1800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858d1800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca09e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85941e40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:858d1800 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0e1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84c39f8c r4:84c39c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84c39f8c r4:8586c280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858d1800 r8:8586c2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8586c280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8586c280 r8:8027f5e8 r7:ec9f5e60 r6:8586c300 r5:858d1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca09fb0 to 0xeca09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:858565c0 INFO: task kworker/0:455:5940 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 92408000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:945:5944 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:945 state:D stack:0 pid:5944 tgid:5944 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eca15d84 r8:00000002 r7:60000113 r6:eca15d8c r5:858c4800 r4:858c4800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858c4800 r4:82918808 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85868500 r5:00001000 r4:dfdc1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8590638c r4:8584ce00 r10:61c88647 r9:858c4800 r8:8584ce2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8584ce00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8584ce00 r8:8027f5e8 r7:ec9d1e60 r6:8586c380 r5:858c4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca15fb0 to 0xeca15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85868300 INFO: task kworker/1:945:5944 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 9284f000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:946:5946 blocked for more than 472 seconds. Call trace: [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:eaea1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85906b8c r4:8584ce80 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:947:5948 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:947 state:D stack:0 pid:5948 tgid:5948 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec6a1d84 r8:00000002 r7:60000113 r6:ec6a1d8c r5:84cc2400 r4:84cc2400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cc2400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6a1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85868880 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84cc2400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1d9000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85906f8c r4:85906c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85906f8c r4:8584cf00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84cc2400 r8:8584cf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8584cf00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8584cf00 r8:8027f5e8 r7:ec685e60 r6:8586c480 r5:84cc2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6a1fb0 to 0xec6a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85868680 INFO: task kworker/1:947:5948 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 9284f000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:e884ddc0 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:456:5949 blocked for more than 472 seconds. Call trace: [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85943440 r5:00001000 r4:ec747000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8590cf8c r4:8586c500 r4:00000001 Exception stack(0xec6a9fb0 to 0xec6a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d4bf80 INFO: task kworker/0:456:5949 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 93204000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:948:5951 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:948 state:D stack:0 pid:5951 tgid:5951 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec76dd84 r8:00000002 r7:60000013 r6:ec76dd8c r5:84cc3c00 r4:84cc3c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cc3c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec76de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85868900 r4:00000000 r9:83018205 r8:84cc3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 r5:00001000 r4:eb2cd000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8590738c r4:85907000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8590738c r4:8584cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84cc3c00 r8:8584cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8584cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8584cf80 r8:8027f5e8 r7:ec6a1e60 r6:8586c600 r5:84cc3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec76dfb0 to 0xec76dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:858688c0 INFO: task kworker/1:948:5951 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 93204000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:e884ddc0 r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 INFO: task kworker/1:949:5952 blocked for more than 472 seconds. Call trace: [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:84cc4800 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 r5:00001000 r4:eb759000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85907f8c r4:85864000 r10:61c88647 r9:84cc4800 r8:8586402c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:858688c0 INFO: task kworker/1:949:5952 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 93204000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:950:5954 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:950 state:D stack:0 pid:5954 tgid:5954 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec7cdd84 r8:00000002 r7:60000113 r6:ec7cdd8c r5:84cc0000 r4:84cc0000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cc0000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7cde08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858688c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84cc0000 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb405000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:8590778c r4:85864080 r10:00000000 r9:85864080 r8:8027f5e8 r7:ec7a5e60 r6:8586c700 r5:84cc0000 r4:858688c0 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:82ac11a4 r4:00000000 r5:84fe9f8c r4:84fe9c00 r4:8454db00 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:951 state:D stack:0 pid:5956 tgid:5956 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85868d00 r5:00001000 r4:eb6ed000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85907b8c r4:85864100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84cc5400 r8:8586412c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85864100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85864100 r8:8027f5e8 r7:ec7a5e60 r6:8586c780 r5:84cc5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7d9fb0 to 0xec7d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85868a00 INFO: task kworker/1:951:5956 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 9372d000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:952:5959 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:952 state:D stack:0 pid:5959 tgid:5959 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec841d84 r8:00000002 r7:60000113 r6:ec841d8c r5:84cc6c00 r4:84cc6c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cc6c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec841e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85868100 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84cc6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7bb000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8590878c r4:85908400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8590878c r4:85864180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84cc6c00 r8:858641ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85864180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85864180 r8:8027f5e8 r7:ec7a5e60 r6:8586c800 r5:84cc6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec841fb0 to 0xec841ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85868c00 INFO: task kworker/1:952:5959 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 9372d000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:953:5960 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:953 state:D stack:0 pid:5960 tgid:5960 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: r5:85822400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec655e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85868f00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85822400 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb795000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8590838c r4:85908000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8590838c r4:85864200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85822400 r8:8586422c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85864200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85864200 r8:8027f5e8 r7:ec841e60 r6:85864280 r5:85822400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec655fb0 to 0xec655ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85868c00 INFO: task kworker/1:953:5960 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:ebb35000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85908f8c r4:85864300 5fa0: 00000000 00000000 00000000 00000000 [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:955:5964 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:955 state:D stack:0 pid:5964 tgid:5964 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec875d84 r8:00000002 r7:60000113 r6:ec875d8c r5:84cc8000 r4:84cc8000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cc8000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec875e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85856340 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84cc8000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb92d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85908b8c r4:85908800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85908b8c r4:85864380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84cc8000 r8:858643ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85864380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85864380 r8:8027f5e8 r7:ec865e60 r6:8586c900 r5:84cc8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec875fb0 to 0xec875ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:956:5966 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:956 state:D stack:0 pid:5966 tgid:5966 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec63f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84cc9800 r8:8586442c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85868a80 Workqueue: events bpf_prog_free_deferred dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 r4:00000000 r5:84fe9f8c r4:84fe9c00 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e5aa80 Workqueue: events bpf_prog_free_deferred [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:ec391000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:958:5971 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:958 state:D stack:0 pid:5971 tgid:5971 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eca35d84 r8:00000002 r7:60000113 r6:eca35d8c r5:84ccc800 r4:84ccc800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ccc800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca35e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85926400 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ccc800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec3ad000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8590978c r4:85909400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8590978c r4:85864500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ccc800 r8:8586452c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec3e5000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85909b8c r4:85864580 Exception stack(0xeca39fb0 to 0xeca39ff8) task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:960:5974 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:960 state:D stack:0 pid:5974 tgid:5974 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eca41d84 r8:00000002 r7:60000113 r6:eca41d8c r5:84cce000 r4:84cce000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cce000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca41e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85926680 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84cce000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec3fb000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84cce000 r8:8586462c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe884dd28 to 0xe884dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:84ccb000 r4:82918808 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec41b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8590a38c r4:8590a000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8590a38c r4:85864680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ccb000 r8:858646ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85864680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85864680 r8:8027f5e8 r7:eca21e60 r6:8586cc00 r5:84ccb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca49fb0 to 0xeca49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85926480 INFO: task kworker/1:961:5976 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 9538d000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8454db00 Exception stack(0xe884dfb0 to 0xe884dff8) Not tainted 6.15.0-syzkaller #0 r4:84ccbc00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ccbc00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca51e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85926900 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ccbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec433000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8590a78c r4:8590a400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8590a78c r4:85864700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ccbc00 r8:8586472c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85864700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85864700 r8:8027f5e8 r7:eca21e60 r6:8586cc80 r5:84ccbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca51fb0 to 0xeca51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859267c0 INFO: task kworker/1:962:5978 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 r5:80070013 r4:80239bb0 r4:e884ddc0 r5:00001000 r4:e884f000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:963 state:D stack:0 pid:5980 tgid:5980 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec44b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8590ab8c r4:8590a800 r10:61c88647 r9:84ccec00 r8:858647ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:84e5aa80 task:kworker/1:964 state:D stack:0 pid:5982 tgid:5982 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec46f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85864800 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85926880 INFO: task kworker/1:964:5982 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 95778000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:965:5984 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:965 state:D stack:0 pid:5984 tgid:5984 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eca69d84 r8:00000002 r7:60000113 r6:eca69d8c r5:858d8c00 r4:858d8c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858d8c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca69e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85926cc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858d8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec48b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8590b38c r4:8590b000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8590b38c r4:85864880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858d8c00 r8:858648ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85864880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85864880 r8:8027f5e8 r7:eca21e60 r6:8586ce00 r5:858d8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca69fb0 to 0xeca69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85926a80 INFO: task kworker/1:965:5984 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 95b33000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:966:5986 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:966 state:D stack:0 pid:5986 tgid:5986 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eca6dd84 r8:00000002 r7:60000113 r6:eca6dd8c r5:858d9800 r4:858d9800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858d9800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca6de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85926ec0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858d9800 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5dd000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8590b78c r4:8590b400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8590b78c r4:85864900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858d9800 r8:8586492c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85864900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85864900 r8:8027f5e8 r7:eca21e60 r6:8586ce80 r5:858d9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca6dfb0 to 0xeca6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85926a00 INFO: task kworker/1:966:5986 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 9606f000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:967:5988 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:967 state:D stack:0 pid:5988 tgid:5988 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eca75d84 r8:00000002 r7:60000113 r6:eca75d8c r5:858db000 r4:858db000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858db000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca75e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85926f40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858db000 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec617000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8590bb8c r4:8590b800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8590bb8c r4:85864980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858db000 r8:858649ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85864980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85864980 r8:8027f5e8 r7:eca21e60 r6:8586cf00 r5:858db000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca75fb0 to 0xeca75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85926a00 INFO: task kworker/1:967:5988 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 963ca000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:968:5990 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:968 state:D stack:0 pid:5990 tgid:5990 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eca7dd84 r8:00000002 r7:60000113 r6:eca7dd8c r5:858dc800 r4:858dc800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858dc800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca7de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8586fa40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858dc800 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec623000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8590bf8c r4:8590bc00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8590bf8c r4:85864a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858dc800 r8:85864a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85864a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85864a00 r8:8027f5e8 r7:eca21e60 r6:8586cf80 r5:858dc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca7dfb0 to 0xeca7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85926e00 INFO: task kworker/1:968:5990 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 96631000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:969:5993 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:969 state:D stack:0 pid:5993 tgid:5993 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eca89d84 r8:00000002 r7:60000013 r6:eca89d8c r5:858dbc00 r4:858dbc00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858dbc00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca89e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85943280 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858dbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec691000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8590cb8c r4:8590c800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8590cb8c r4:85864a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858dbc00 r8:85864aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85864a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85864a80 r8:8027f5e8 r7:eca21e60 r6:85948000 r5:858dbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca89fb0 to 0xeca89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85926e40 INFO: task kworker/1:969:5993 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 96631000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:970:5994 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:970 state:D stack:0 pid:5994 tgid:5994 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eca8dd84 r8:00000002 r7:60000013 r6:eca8dd8c r5:858de000 r4:858de000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858de000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca8de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859430c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858de000 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec661000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8590c78c r4:8590c400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8590c78c r4:85864b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858de000 r8:85864b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85864b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85864b00 r8:8027f5e8 r7:eca89e60 r6:85948080 r5:858de000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca8dfb0 to 0xeca8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85926e40 INFO: task kworker/1:970:5994 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 96866000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:971:5996 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:971 state:D stack:0 pid:5996 tgid:5996 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eca95d84 r8:00000002 r7:60000113 r6:eca95d8c r5:858dd400 r4:858dd400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858dd400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca95e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85943bc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858dd400 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8801000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8590e38c r4:8590e000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8590e38c r4:85864b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858dd400 r8:85864bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85864b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85864b80 r8:8027f5e8 r7:eca89e60 r6:85948100 r5:858dd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca95fb0 to 0xeca95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859431c0 INFO: task kworker/1:971:5996 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 96aa2000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:84e5aa80 task:kworker/0:457 state:D stack:0 pid:5999 tgid:5999 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec76f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:8590d38c r4:85948180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858dec00 r8:859481ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85948180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85948180 r8:8027f5e8 r7:eca09e60 r6:85948200 r5:858dec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca65fb0 to 0xeca65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859416c0 INFO: task kworker/0:457:5999 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 96cf3000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:972:6002 blocked for more than 473 seconds. Workqueue: events bpf_prog_free_deferred r5:858da400 r4:82918808 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca91e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85943740 r5:00001000 r4:ec7b7000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8590d78c r4:8590d400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8590d78c r4:85864c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85864c00 r8:8027f5e8 r7:eca95e60 r6:85948280 r5:858da400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred r4:00000000 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:458:6003 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:458 state:D stack:0 pid:6003 tgid:6003 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eca99d84 r8:00000002 r7:60000113 r6:eca99d8c r5:858d8000 r4:858d8000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858d8000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca99e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85941b40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:858d8000 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec80b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85873f8c r4:85873c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85873f8c r4:85948300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858d8000 r8:8594832c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85948300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85948300 r8:8027f5e8 r7:eca09e60 r6:85948380 r5:858d8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca99fb0 to 0xeca99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85941780 INFO: task kworker/0:458:6003 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 9713a000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:973:6004 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:973 state:D stack:0 pid:6004 tgid:6004 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eca9dd84 r8:00000002 r7:60000113 r6:eca9dd8c r5:84cc6000 r4:84cc6000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cc6000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca9de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85943880 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84cc6000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7db000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8590db8c r4:8590d800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8590db8c r4:85864c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84cc6000 r8:85864cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85864c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85864c80 r8:8027f5e8 r7:eca95e60 r6:85948400 r5:84cc6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca9dfb0 to 0xeca9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85943680 INFO: task kworker/1:973:6004 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 9732e000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:974:6008 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:974 state:D stack:0 pid:6008 tgid:6008 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec65dd84 r8:00000002 r7:60000013 r6:ec65dd8c r5:85028000 r4:85028000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85028000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec65de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85943ac0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85028000 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb13000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8590df8c r4:8590dc00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8590df8c r4:85864d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85028000 r8:85864d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85864d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85864d00 r8:8027f5e8 r7:eca95e60 r6:85948480 r5:85028000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec65dfb0 to 0xec65dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85943a00 INFO: task kworker/1:974:6008 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 97496000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:975:6010 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:975 state:D stack:0 pid:6010 tgid:6010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec8edd84 r8:00000002 r7:60000013 r6:ec8edd8c r5:85028c00 r4:85028c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85028c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8ede08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85943b00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85028c00 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5fd000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8590eb8c r4:8590e800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8590eb8c r4:85864d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85028c00 r8:85864dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85864d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85864d80 r8:8027f5e8 r7:eca95e60 r6:85948500 r5:85028c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8edfb0 to 0xec8edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85943a00 INFO: task kworker/1:975:6010 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 97711000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:459:6012 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:459 state:D stack:0 pid:6012 tgid:6012 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ecaa1d84 r8:00000002 r7:60000113 r6:ecaa1d8c r5:85029800 r4:85029800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85029800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecaa1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85941fc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85029800 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb44d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84c39b8c r4:84c39800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84c39b8c r4:85948580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85029800 r8:859485ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85948580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85948580 r8:8027f5e8 r7:eca09e60 r6:85948600 r5:85029800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecaa1fb0 to 0xecaa1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85941c40 INFO: task kworker/0:459:6012 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 978e9000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8595b4c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8502a400 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec869000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858a538c r4:858a5000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858a538c r4:85948680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8502a400 r8:859486ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85948680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85948680 r8:8027f5e8 r7:ecaa1e60 r6:85948700 r5:8502a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec905fb0 to 0xec905ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85941dc0 INFO: task kworker/0:460:6014 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 9796d000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:8502b000 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858a438c r4:858a4000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858a438c r4:85948780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8502b000 r8:859487ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85948780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85948780 r8:8027f5e8 r7:ec905e60 r6:85948800 r5:8502b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8f5fb0 to 0xec8f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85941dc0 INFO: task kworker/0:461:6016 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 97e32000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:976:6018 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:976 state:D stack:0 pid:6018 tgid:6018 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec98dd84 r8:00000002 r7:60000113 r6:ec98dd8c r5:8502c800 r4:8502c800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8502c800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8590e78c r4:8590e400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85943d00 INFO: task kworker/1:976:6018 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 97fe2000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:977:6019 blocked for more than 473 seconds. [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8590f38c r4:8590f000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd20: 97fe2000 e47a4000 00000001 80239b98 7f1cb000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:978:6021 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:978 state:D stack:0 pid:6021 tgid:6021 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec921d84 r8:00000002 r7:60000113 r6:ec921d8c r5:8502e000 r4:8502e000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8502e000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec921e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85943c80 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8502e000 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9cd000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8590ef8c r4:8590ec00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8590ef8c r4:85864f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8502e000 r8:85864f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85864f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85864f00 r8:8027f5e8 r7:ec99de60 r6:85948980 r5:8502e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec921fb0 to 0xec921ff8) 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 98412000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r4:8502ec00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec989e08 r5:00001000 r4:eb845000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858a478c r4:858a4400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85948a00 r8:8027f5e8 r7:ec905e60 r6:85948a80 r5:8502ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec989fb0 to 0xec989ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85940140 INFO: task kworker/0:462:6024 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 9897b000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858a4f8c r4:858a4c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85948b00 r8:8027f5e8 r7:ec905e60 r6:85948b80 r5:8502bc00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe884dd28 to 0xe884dd70) r4:82ac11a4 r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85943fc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84e88000 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba19000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858a4b8c r4:858a4800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858a4b8c r4:85864f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e88000 r8:85864fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85864f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85864f80 r8:8027f5e8 r7:ec99de60 r6:85948c00 r5:84e88000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9bdfb0 to 0xec9bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859433c0 INFO: task kworker/1:979:6027 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 98ca0000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:980:6030 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:980 state:D stack:0 pid:6030 tgid:6030 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec9e5d84 r8:00000002 r7:60000113 r6:ec9e5d8c r5:84e88c00 r4:84e88c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e88c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9e5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859362c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84e88c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaab000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8590f78c r4:8590f400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8590f78c r4:85935000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e88c00 r8:8593502c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85935000 r10:00000000 r9:85935000 r8:8027f5e8 r7:ec99de60 r6:85948c80 r5:84e88c00 task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad4 80239bb0 80070013 ffffffff r4:e884ddc0 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85936480 r5:8590fb8c r4:8590f800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85935080 r8:8027f5e8 r7:ec9e5e60 r6:85948d00 r5:84e8a400 r4:85936140 INFO: task kworker/1:981:6032 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 996d0000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:982:6033 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:982 state:D stack:0 pid:6033 tgid:6033 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eca05d84 r8:00000002 r7:60000013 r6:eca05d8c r5:84e8b000 r4:84e8b000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e8b000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca05e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85936700 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84e8b000 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec503000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8591038c r4:85910000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8591038c r4:85935100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85935100 r8:8027f5e8 r7:ec9f1e60 r6:85948d80 r5:84e8b000 task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad4 80239bb0 80070013 ffffffff r4:e884ddc0 r5:00001000 r4:e884f000 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:8291880c r9:eca1dd84 r8:00000002 r7:60000013 r6:eca1dd8c r5:84e8c800 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85936580 r5:8590ff8c r4:8590fc00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8590ff8c r4:85935180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e8c800 r8:859351ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85935180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85935180 r8:8027f5e8 r7:eca05e60 r6:85948e00 r5:84e8c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca1dfb0 to 0xeca1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85936440 INFO: task kworker/1:983:6035 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 99ac1000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:984:6037 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:984 state:D stack:0 pid:6037 tgid:6037 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:8291880c r9:ecaa9d84 r8:00000002 r7:60000013 r6:ecaa9d8c r5:84e8bc00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecaa9e08 r5:00001000 r4:ec757000 r5:8591278c r4:85912400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85935200 r8:8027f5e8 r7:eca05e60 r6:85948e80 r5:84e8bc00 r4:85936600 Workqueue: events bpf_prog_free_deferred dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 r4:e884ddc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:985:6040 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:985 state:D stack:0 pid:6040 tgid:6040 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ecab5d84 r8:00000002 r7:60000113 r6:ecab5d8c r5:84e8d400 r4:84e8d400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e8d400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecab5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85936840 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84e8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec523000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8591078c r4:85910400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8591078c r4:85935280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e8d400 r8:859352ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85935280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85935280 r8:8027f5e8 r7:ecaa9e60 r6:85948f00 r5:84e8d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecab5fb0 to 0xecab5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 99ff0000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 r4:8454db00 Exception stack(0xe884dfb0 to 0xe884dff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:84e8e000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecab9e08 r9:83018205 r8:84e8e000 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 r5:85910b8c r4:85910800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85910b8c r4:85935300 r10:61c88647 r9:84e8e000 r8:8593532c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 dd60: 80230ad4 80239bb0 80070013 ffffffff r4:e884ddc0 r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 r4:8454db00 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8291880c r9:ecac1d84 r8:00000002 r7:60000113 r6:ecac1d8c r5:84e8ec00 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85910f8c r4:85910c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e8ec00 r8:859353ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85935380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85935380 r8:8027f5e8 r7:ecaa9e60 r6:8594d000 r5:84e8ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecac1fb0 to 0xecac1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859368c0 INFO: task kworker/1:987:6043 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 9a72d000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:988:6046 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:988 state:D stack:0 pid:6046 tgid:6046 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:84c51800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecacde08 r9:83018205 r8:84c51800 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 r5:8591138c r4:85911000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8591138c r4:85935400 r10:61c88647 r9:84c51800 r8:8593542c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe884dd28 to 0xe884dd70) r4:82ac11a4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:8591178c r4:85911400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8591178c r4:85935480 r10:00000000 r9:85935480 r8:8027f5e8 r7:ecaa9e60 r6:8594d100 r5:84c50000 task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad4 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:990:6049 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:990 state:D stack:0 pid:6049 tgid:6049 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ecad9d84 r8:00000002 r7:60000113 r6:ecad9d8c r5:84c53000 r4:84c53000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c53000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecad9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85936e80 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84c53000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6d3000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85911b8c r4:85911800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85911b8c r4:85935500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c53000 r8:8593552c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85935500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85935500 r8:8027f5e8 r7:ecaa9e60 r6:8594d180 r5:84c53000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecad9fb0 to 0xecad9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85936b80 INFO: task kworker/1:990:6049 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 9af09000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85911f8c r4:85911c00 r10:61c88647 r9:84c52400 r8:859355ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85935580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85935580 r8:8027f5e8 r7:ecaa9e60 r6:8594d200 r5:84c52400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecae1fb0 to 0xecae1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85936c80 INFO: task kworker/1:991:6051 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 9b750000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 Exception stack(0xe884dfb0 to 0xe884dff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:85826c00 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859433c0 r5:8591238c r4:85912000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8591238c r4:85935600 r10:61c88647 r9:85826c00 r8:8593562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe884dd28 to 0xe884dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85824800 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 r5:85912b8c r4:85912800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85935700 r8:8027f5e8 r7:ecaa9e60 r6:85935780 r5:85824800 task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad4 80239bb0 80070013 ffffffff r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:994:6057 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:994 state:D stack:0 pid:6057 tgid:6057 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec9cdd84 r8:00000002 r7:60000013 r6:ec9cdd8c r5:85823c00 r4:85823c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85823c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9cde08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859564c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85823c00 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec831000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85912f8c r4:85912c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85912f8c r4:85935800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85823c00 r8:8593582c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85935800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85935800 r8:8027f5e8 r7:ecae5e60 r6:85935880 r5:85823c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfa0: 00000000 00000000 00000000 00000000 [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:85820000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecaede08 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8591338c r4:85913000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:e884ddc0 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:996:6061 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:996 state:D stack:0 pid:6061 tgid:6061 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ecaf1d84 r8:00000002 r7:60000113 r6:ecaf1d8c r5:85825400 r4:85825400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85825400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecaf1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85956a80 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85825400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfafb000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8591378c r4:85913400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8591378c r4:85935a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85825400 r8:85935a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85935a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85935a00 r8:8027f5e8 r7:ecaede60 r6:85935a80 r5:85825400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecaf1fb0 to 0xecaf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85956340 INFO: task kworker/1:996:6061 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 9c4f4000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:464:6063 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:464 state:D stack:0 pid:6063 tgid:6063 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ecb01d84 r8:00000002 r7:60000113 r6:ecb01d8c r5:847c8c00 r4:847c8c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847c8c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb01e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b5c800 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:847c8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f513000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eccff000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e9e38c r4:84e9e000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e9e38c r4:8594d280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847c8c00 r8:8594d2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8594d280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8594d280 r8:8027f5e8 r7:ec905e60 r6:85935b00 r5:847c8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb01fb0 to 0xecb01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8595b340 INFO: task kworker/0:464:6063 is blocked on a mutex likely owned by task kworker/1:174:3878. [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11a4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r5:84fe9f8c r4:84fe9c00 r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:84e5aa80 Workqueue: events bpf_prog_free_deferred r5:847c9800 r4:82918808 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:858a5f8c r4:858a5c00 r4:8594d300 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11a4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:997 state:D stack:0 pid:6068 tgid:6068 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ecafdd84 r8:00000002 r7:60000113 r6:ecafdd8c r5:847ca400 r4:847ca400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847ca400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecafde08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85956bc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847ca400 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea8b5000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85913b8c r4:85913800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85913b8c r4:85935c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847ca400 r8:85935c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85935c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85935c00 r8:8027f5e8 r7:ecaf1e60 r6:85935c80 r5:847ca400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecafdfb0 to 0xecafdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85956900 INFO: task kworker/1:997:6068 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 9cba1000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 INFO: task kworker/1:998:6070 blocked for more than 473 seconds. r4:847cb000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecaf9e08 r5:00001000 r4:eb217000 r5:8591c38c r4:8591c000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8591c38c r4:85935d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847cb000 r8:85935d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85935d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85935d00 r8:8027f5e8 r7:ecafde60 r6:85935d80 r5:847cb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecaf9fb0 to 0xecaf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85956a40 INFO: task kworker/1:998:6070 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 9ccba000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:8291880c r9:ec7f1d84 r8:00000002 r7:60000013 r6:ec7f1d8c r5:847cbc00 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:85913f8c r4:85913c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:847cbc00 r8:85935e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r4:82ac11a4 r4:00000000 r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1000:6074 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1000 state:D stack:0 pid:6074 tgid:6074 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ec855d84 r8:00000002 r7:60000113 r6:ec855d8c r5:847cc800 r4:847cc800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847cc800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec855e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d5b3c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847cc800 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3c9000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8591c78c r4:8591c400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8591c78c r4:85935f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847cc800 r8:85935f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85935f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85935f00 r8:8027f5e8 r7:ecaf9e60 r6:85935f80 r5:847cc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec855fb0 to 0xec855ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85956d80 INFO: task kworker/1:1000:6074 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 9ccba000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:847cd400 r4:82918808 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8591cb8c r4:8591c800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xecaf5fb0 to 0xecaf5ff8) Workqueue: events bpf_prog_free_deferred dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1002:6077 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1002 state:D stack:0 pid:6077 tgid:6077 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:847ce000 r4:82918808 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8591cf8c r4:8591cc00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 r4:e884ddc0 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r4:84e5aa80 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec895e08 r5:8591d38c r4:8591d000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8591d38c r4:84dba200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847cec00 r8:84dba22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84dba200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dba200 r8:8027f5e8 r7:ec88de60 r6:84dba280 r5:847cec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec895fb0 to 0xec895ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ceb000 INFO: task kworker/1:1003:6081 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 9db68000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84e5aa80 Workqueue: events bpf_prog_free_deferred [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:82ac11a4 r4:00000000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eca45d84 r8:00000002 r7:60000013 r6:eca45d8c r5:85826000 r4:85826000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85826000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca45e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ceb4c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85826000 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb59000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8591db8c r4:8591d800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8591db8c r4:84dba400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85826000 r8:84dba42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84dba400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dba400 r8:8027f5e8 r7:eca2de60 r6:84dba480 r5:85826000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca45fb0 to 0xeca45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ceb180 INFO: task kworker/1:1005:6085 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 9df34000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84e5aa80 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec3a7000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8591df8c r4:8591dc00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8591df8c r4:84dba500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c50c00 r8:84dba52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84dba500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dba500 r8:8027f5e8 r7:eca45e60 r6:8594d380 r5:84c50c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb09fb0 to 0xecb09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ceb340 INFO: task kworker/1:1006:6086 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 9e055000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:1007 state:D stack:0 pid:6088 tgid:6088 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r9:83018205 r8:84c54800 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84dba580 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec3c7000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8591e38c r4:8591e000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8591e38c r4:84dba600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85968000 r8:84dba62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84dba600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dba600 r8:8027f5e8 r7:ecb11e60 r6:84dba680 r5:85968000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca79fb0 to 0xeca79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ceb440 INFO: task kworker/1:1008:6089 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 9ea62000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1009:6092 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1009 state:D stack:0 pid:6092 tgid:6092 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r5:85968c00 r4:82918808 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8591ef8c r4:8591ec00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8591ef8c r4:84dba700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85968c00 r8:84dba72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84dba700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dba700 r8:8027f5e8 r7:ecb11e60 r6:84dba780 r5:85968c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb15fb0 to 0xecb15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ceb600 INFO: task kworker/1:1009:6092 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 9ea62000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 r10:8291880c r9:ecb19d84 r8:00000002 r7:60000113 r6:ecb19d8c r5:85969800 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ceba80 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:8591eb8c r4:84dba800 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1011:6096 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1011 state:D stack:0 pid:6096 tgid:6096 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec64b000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 r4:00000001 r4:84e5aa80 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cebd80 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8596b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec47b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8591f38c r4:8591f000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8591f38c r4:84dbaa00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8596b000 r8:84dbaa2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84dbaa00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dbaa00 r8:8027f5e8 r7:eca25e60 r6:84dbaa80 r5:8596b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb1dfb0 to 0xecb1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84cebc00 INFO: task kworker/1:1012:6098 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 9f05b000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1013:6100 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1013 state:D stack:0 pid:6100 tgid:6100 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ecb25d84 r8:00000002 r7:60000113 r6:ecb25d8c r5:8596bc00 r4:8596bc00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8596bc00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb25e08 r4:00000000 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8591f78c r4:8591f400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8596bc00 r8:84dbab2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 INFO: task kworker/1:1013:6100 is blocked on a mutex likely owned by task kworker/1:174:3878. dd60: 80230ad4 80239bb0 80070013 ffffffff r4:e884ddc0 r5:00001000 r4:e884f000 r5:84fe9f8c r4:84fe9c00 r4:8454db00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8591fb8c r4:8591f800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8591fb8c r4:84dbac00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8596d400 r8:84dbac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84dbac00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dbac00 r8:8027f5e8 r7:eca25e60 r6:84dbac80 r5:8596d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb21fb0 to 0xecb21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84cebe40 INFO: task kworker/1:1014:6101 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 9f2a7000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1015:6104 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1015 state:D stack:0 pid:6104 tgid:6104 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ecb2dd84 r8:00000002 r7:60000013 r6:ecb2dd8c r5:8596c800 r4:8596c800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8596c800 r4:82918808 [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8591ff8c r4:84dbad00 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1016:6105 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1016 state:D stack:0 pid:6105 tgid:6105 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ecb31d84 r8:00000002 r7:60000113 r6:ecb31d8c r5:84c56000 r4:84c56000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c56000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb31e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859eb9c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84c56000 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 r5:00001000 r4:ec7a7000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84c56000 r8:84dbae2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe884dd28 to 0xe884dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe884dfb0 to 0xe884dff8) task:kworker/1:1017 state:D stack:0 pid:6108 tgid:6108 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85a0c78c r4:85a0c400 r10:61c88647 r9:8596e000 r8:84dbaeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 dd20: 9f77f000 e47a4000 00000001 80239b98 7f1cb000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1018:6110 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1018 state:D stack:0 pid:6110 tgid:6110 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ecb35d84 r8:00000002 r7:60000013 r6:ecb35d8c r5:8596ec00 r4:8596ec00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8596ec00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb35e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859eb640 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8596ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec713000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a0cb8c r4:85a0c800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a0cb8c r4:84dbaf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8596ec00 r8:84dbafac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84dbaf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dbaf80 r8:8027f5e8 r7:ecb31e60 r6:859e9000 r5:8596ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb35fb0 to 0xecb35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859eb3c0 INFO: task kworker/1:1018:6110 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 9fa1d000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1019:6112 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1019 state:D stack:0 pid:6112 tgid:6112 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ecb39d84 r8:00000002 r7:60000113 r6:ecb39d8c r5:85970000 r4:85970000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85970000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ec75d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85a0cf8c r4:859e9080 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:82ac11a4 r4:00000000 r5:84fe9f8c r4:84fe9c00 r4:8454db00 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:1020 state:D stack:0 pid:6114 tgid:6114 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:ec7b9000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85a0d78c r4:85a0d400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a0d78c r4:859e9180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85970c00 r8:859e91ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859e9180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859e9180 r8:8027f5e8 r7:ecb31e60 r6:859e9200 r5:85970c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb3dfb0 to 0xecb3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859eb840 INFO: task kworker/1:1020:6114 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 9fe9a000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1021:6117 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1021 state:D stack:0 pid:6117 tgid:6117 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ecb41d84 r8:00000002 r7:60000113 r6:ecb41d8c r5:85971800 r4:85971800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85971800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb41e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859ebc40 r5:00001000 r4:ec7f3000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a0db8c r4:85a0d800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a0db8c r4:859e9280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85971800 r8:859e92ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859e9280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859e9280 r8:8027f5e8 r7:ecb3de60 r6:859e9300 r5:85971800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb41fb0 to 0xecb41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859eb980 INFO: task kworker/1:1021:6117 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: 9fe9a000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 r4:82ac11a4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1022:6119 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1022 state:D stack:0 pid:6119 tgid:6119 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ecb49d84 r8:00000002 r7:60000113 r6:ecb49d8c r5:85972400 r4:85972400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85972400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb49e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:ec815000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85a0df8c r4:859e9380 9fa0: 00000000 00000000 00000000 00000000 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:82ac11a4 r4:00000000 r5:84fe9f8c r4:84fe9c00 r4:8454db00 r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1023:6120 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1023 state:D stack:0 pid:6120 tgid:6120 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ecb45d84 r8:00000002 r7:60000013 r6:ecb45d8c r5:85973000 r4:85973000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85973000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb45e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859ebf80 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85973000 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec897000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a0e38c r4:85a0e000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a0e38c r4:859e9480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85973000 r8:859e94ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859e9480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859e9480 r8:8027f5e8 r7:ecb49e60 r6:859e9500 r5:85973000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb45fb0 to 0xecb45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859ebbc0 INFO: task kworker/1:1023:6120 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad4 80239bb0 80070013 ffffffff r4:00000000 r5:84fe9f8c r4:84fe9c00 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:466 state:D stack:0 pid:6231 tgid:6231 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 r5:00001000 r4:ecbd3000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 Exception stack(0xe884dd28 to 0xe884dd70) dd20: a0482000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:467:6244 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:467 state:D stack:0 pid:6244 tgid:6244 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ecb99d84 r8:00000002 r7:60000113 r6:ecb99d8c r5:84c56c00 r4:84c56c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c56c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb99e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83e0ac40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84c56c00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eccfd000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858a6b8c r4:858a6800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858a6b8c r4:8594d580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c56c00 r8:8594d5ac r7:82804d40 r6:dddced80 r5:dddceda0 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 dd60: 80230ad4 80239bb0 80070013 ffffffff r4:00000000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:84c90c00 [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ecd83000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e9cb8c r4:84e9c800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e9cb8c r4:8594d680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c90c00 r8:8594d6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8594d680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8594d680 r8:8027f5e8 r7:ecb01e60 r6:8594d700 r5:84c90c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccb5fb0 to 0xeccb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:83e0aac0 INFO: task kworker/0:468:6286 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: a0986000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 dfa0: 00000000 00000000 00000000 00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed48de08 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85b5c980 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:470:6905 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:470 state:D stack:0 pid:6905 tgid:6905 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ed515d84 r8:00000002 r7:60000113 r6:ed515d8c r5:84c90000 r4:84c90000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c25a00 r5:00001000 r4:ed4fd000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Workqueue: events bpf_prog_free_deferred r4:82ac11a4 r5:00001000 r4:e884f000 r4:8454db00 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:471:6919 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:471 state:D stack:0 pid:6919 tgid:6919 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ed72dd84 r8:00000002 r7:60000113 r6:ed72dd8c r5:84c93c00 r4:84c93c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c93c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed72de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c25f40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84c93c00 r7:00000000 r6:83018000 r5:00001000 r4:7f64d000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed253000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e9eb8c r4:84e9e800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e9eb8c r4:8594d980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c93c00 r8:8594d9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8594d980 dfa0: 00000000 00000000 00000000 00000000 dd20: a10bd000 e47a4000 00000001 80239b98 7f1cb000 00000001 r5:00001000 r4:e884f000 r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:472 state:D stack:0 pid:6961 tgid:6961 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ed67dd84 r8:00000002 r7:60000013 r6:ed67dd8c r5:84c91800 r4:84c91800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c91800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed67de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e36680 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84c91800 r7:00000000 r6:83018000 r5:00001000 r4:7f64f000 r5:00001000 r4:ed27f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:84e9d78c r4:8594da80 Exception stack(0xed67dfb0 to 0xed67dff8) r4:84c25580 Workqueue: events bpf_prog_free_deferred dd20: a176e000 e47a4000 00000001 80239b98 7f1cb000 00000001 r4:e884ddc0 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:473:6962 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:473 state:D stack:0 pid:6962 tgid:6962 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ed591d84 r8:00000002 r7:60000013 r6:ed591d8c r5:84c96c00 r4:84c96c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c96c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed591e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d59400 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84c96c00 r7:00000000 r6:83018000 r5:00001000 r4:7f653000 r5:00001000 r4:ec82f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:8594db80 r4:84c25580 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:474 state:D stack:0 pid:6966 tgid:6966 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ed60dd84 r8:00000002 r7:60000013 r6:ed60dd8c r5:84c95400 r4:84c95400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c95400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed60de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d59700 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ece07000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84e9c78c r4:84e9c400 r7:dddced80 r6:83018000 r5:84e9c78c r4:8594dc80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c95400 r8:8594dcac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8594dc80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8594dc80 r8:8027f5e8 r7:eccb5e60 r6:8594dd00 r5:84c95400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed60dfb0 to 0xed60dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d59300 INFO: task kworker/0:474:6966 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: a176e000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e5aa80 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ecf5f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:82ac11a4 r4:00000000 r5:84fe9f8c r4:84fe9c00 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e5aa80 Workqueue: events bpf_prog_free_deferred r10:8291880c r9:ed6a1d84 r8:00000002 r7:60000013 r6:ed6a1d8c r5:85983c00 [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d59a40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85983c00 r7:00000000 r6:83018000 r5:00001000 r4:7f65b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed017000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858a7f8c r4:858a7c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858a7f8c r4:8594de80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85983c00 r8:8594deac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8594de80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8594de80 r8:8027f5e8 r7:ed6b1e60 r6:859e9880 r5:85983c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed6a1fb0 to 0xed6a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d59780 INFO: task kworker/0:476:6970 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: a1d2b000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-syzkaller #0 r4:85980000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85980000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6b9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d59b80 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85980000 r7:00000000 r6:83018000 r5:00001000 r4:7f65d000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed047000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84c3bf8c r4:84c3bc00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84c3bf8c r4:8594df00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85980000 r8:8594df2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8594df00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8594df00 r8:8027f5e8 r7:ed6a1e60 r6:859e9900 r5:85980000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed6b9fb0 to 0xed6b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84d598c0 Workqueue: events bpf_prog_free_deferred dd20: a1d2b000 e47a4000 00000001 80239b98 7f1cb000 00000001 r4:e884ddc0 r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:478 state:D stack:0 pid:6973 tgid:6973 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ed6c5d84 r8:00000002 r7:60000013 r6:ed6c5d8c r5:85983000 r4:85983000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85983000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6c5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d59e00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85983000 r7:00000000 r6:83018000 r5:00001000 r4:7f661000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed14d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84c3b78c r4:84c3b400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84c3b78c r4:8594df80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85983000 r8:8594dfac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8594df80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8594df80 r8:8027f5e8 r7:ed6b9e60 r6:859e9980 r5:85983000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed6c5fb0 to 0xed6c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d59ac0 INFO: task kworker/0:478:6973 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:479:6976 blocked for more than 474 seconds. Workqueue: events bpf_prog_free_deferred r4:85981800 r5:85981800 r4:82918808 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed735e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d59cc0 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84c3bb8c r4:84c3b800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84c3bb8c r4:859f4000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85981800 r8:859f402c r7:82804d40 r6:dddced80 r5:dddceda0 r4:859f4000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859f4000 r8:8027f5e8 r7:ed6c5e60 r6:859e9a00 r5:85981800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed735fb0 to 0xed735ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d59980 INFO: task kworker/0:479:6976 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: a213a000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed739e08 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:ed17f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xed739fb0 to 0xed739ff8) task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11a4 r4:00000000 r5:84fe9f8c r4:84fe9c00 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c5c040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85986c00 r7:00000000 r6:83018000 r5:00001000 r4:7f665000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed199000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84c3af8c r4:84c3ac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84c3af8c r4:859f4100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85986c00 r8:859f412c r7:82804d40 r6:dddced80 r5:dddceda0 r4:859f4100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859f4100 r8:8027f5e8 r7:ed739e60 r6:859e9b00 r5:85986c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed73dfb0 to 0xed73dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d59c00 INFO: task kworker/0:481:6980 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: a23d5000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:482:6982 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:482 state:D stack:0 pid:6982 tgid:6982 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ed745d84 r8:00000002 r7:60000013 r6:ed745d8c r5:85982400 r4:85982400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85982400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:ed1e1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85982400 r8:859f41ac r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe884dd28 to 0xe884dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:483 state:D stack:0 pid:6985 tgid:6985 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85984800 r4:82918808 [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:ed1bf000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84c3ab8c r4:84c3a800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84c3ab8c r4:859f4200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85984800 r8:859f422c r7:82804d40 r6:dddced80 r5:dddceda0 r4:859f4200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859f4200 r8:8027f5e8 r7:ed745e60 r6:859e9c00 r5:85984800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed751fb0 to 0xed751ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84c5c140 INFO: task kworker/0:483:6985 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: a23d5000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/0:484 state:D stack:0 pid:6986 tgid:6986 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed755e08 r5:00001000 r4:ed245000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:859b478c r4:859b4400 r10:61c88647 r9:85985400 r8:859f42ac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:82ac11a4 r4:00000000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:8454db00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:485 state:D stack:0 pid:6987 tgid:6987 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c5c580 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85976c00 r7:00000000 r6:83018000 r5:00001000 r4:7f66b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed201000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859b438c r4:859b4000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859b438c r4:859f4300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85976c00 r8:859f432c r7:82804d40 r6:dddced80 r5:dddceda0 r4:859f4300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859f4300 r8:8027f5e8 r7:ed755e60 r6:859e9d00 r5:85976c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed759fb0 to 0xed759ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84c5c280 INFO: task kworker/0:485:6987 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: a2d9b000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 r10:8291880c r9:ed765d84 r8:00000002 r7:60000113 r6:ed765d8c r5:85990c00 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:ed2a7000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:859f4380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859f4380 r8:8027f5e8 r7:ed755e60 r6:859e9d80 r5:85990c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed765fb0 to 0xed765ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84c5c380 INFO: task kworker/0:486:6990 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: a2d9b000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:487:6991 blocked for more than 475 seconds. r4:85991800 [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ed3d7000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xed769fb0 to 0xed769ff8) task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 r4:00000000 r5:84fe9f8c r4:84fe9c00 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:488 state:D stack:0 pid:6995 tgid:6995 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed779e08 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed2cd000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:82ac11a4 r4:00000000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:489:6996 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:489 state:D stack:0 pid:6996 tgid:6996 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ed77dd84 r8:00000002 r7:60000113 r6:ed77dd8c r5:85992400 r4:85992400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85992400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed77de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c5ca80 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85992400 r7:00000000 r6:83018000 r5:00001000 r4:7f673000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed2f1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859b538c r4:859b5000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859b538c r4:859f4500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85992400 r8:859f452c r7:82804d40 r6:dddced80 r5:dddceda0 r4:859f4500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859f4500 r8:8027f5e8 r7:ed769e60 r6:859e9f00 r5:85992400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed77dfb0 to 0xed77dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84c5c740 INFO: task kworker/0:489:6996 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: a315c000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:490:6998 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:490 state:D stack:0 pid:6998 tgid:6998 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ed785d84 r8:00000002 r7:60000013 r6:ed785d8c r5:85993000 r4:85993000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85993000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed785e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c5cbc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85993000 r7:00000000 r6:83018000 r5:00001000 r4:7f675000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed315000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859b578c r4:859b5400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859b578c r4:859f4580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85993000 r8:859f45ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:859f4580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859f4580 r8:8027f5e8 r7:ed769e60 r6:859e9f80 r5:85993000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed785fb0 to 0xed785ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84c5c900 INFO: task kworker/0:490:6998 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: a379b000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:491:6999 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:491 state:D stack:0 pid:6999 tgid:6999 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ed789d84 r8:00000002 r7:60000113 r6:ed789d8c r5:85993c00 r4:85993c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85993c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed789e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c5cd00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85993c00 r7:00000000 r6:83018000 r5:00001000 r4:7f677000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed351000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859b5b8c r4:859b5800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859b5b8c r4:859f4600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85993c00 r8:859f462c r7:82804d40 r6:dddced80 r5:dddceda0 r4:859f4600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859f4600 r8:8027f5e8 r7:ed769e60 r6:859e9800 r5:85993c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed789fb0 to 0xed789ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84c5ca40 INFO: task kworker/0:491:6999 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: a379b000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:492:7002 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:492 state:D stack:0 pid:7002 tgid:7002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ed795d84 r8:00000002 r7:60000013 r6:ed795d8c r5:85994800 r4:85994800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85994800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed795e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c5ce40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85994800 r7:00000000 r6:83018000 r5:00001000 r4:7f679000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed3c7000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859b5f8c r4:859b5c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859b5f8c r4:859f4680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85994800 r8:859f46ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:859f4680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859f4680 r8:8027f5e8 r7:ed769e60 r6:8505c000 r5:85994800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed795fb0 to 0xed795ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84c5cb80 INFO: task kworker/0:492:7002 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: a39cb000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:493:7003 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:493 state:D stack:0 pid:7003 tgid:7003 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ed799d84 r8:00000002 r7:60000113 r6:ed799d8c r5:85995400 r4:85995400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85995400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed799e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ec9900 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85995400 r7:00000000 r6:83018000 r5:00001000 r4:7f5ed000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc81000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859b678c r4:859b6400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859b678c r4:859f4700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85995400 r8:859f472c r7:82804d40 r6:dddced80 r5:dddceda0 r4:859f4700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859f4700 r8:8027f5e8 r7:ed769e60 r6:8505c080 r5:85995400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed799fb0 to 0xed799ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84c5ccc0 INFO: task kworker/0:493:7003 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: a3aba000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:494:7007 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:494 state:D stack:0 pid:7007 tgid:7007 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ed7a9d84 r8:00000002 r7:60000113 r6:ed7a9d8c r5:85996000 r4:85996000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85996000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed7a9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c5cf40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85996000 r7:00000000 r6:83018000 r5:00001000 r4:7f64b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eccbf000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859b6b8c r4:859b6800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859b6b8c r4:859f4780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85996000 r8:859f47ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:859f4780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859f4780 r8:8027f5e8 r7:ed799e60 r6:8505c100 r5:85996000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed7a9fb0 to 0xed7a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84c5cec0 INFO: task kworker/0:494:7007 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: a3aba000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:495:7008 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:495 state:D stack:0 pid:7008 tgid:7008 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ed7add84 r8:00000002 r7:60000013 r6:ed7add8c r5:85974800 r4:85974800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85974800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed7ade08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a47dc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85974800 r7:00000000 r6:83018000 r5:00001000 r4:7f699000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed521000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859b838c r4:859b8000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859b838c r4:859f4800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85974800 r8:859f482c r7:82804d40 r6:dddced80 r5:dddceda0 r4:859f4800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859f4800 r8:8027f5e8 r7:ed7a9e60 r6:8505c180 r5:85974800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed7adfb0 to 0xed7adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84c5cec0 INFO: task kworker/0:495:7008 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: a3dad000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:496:7010 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:496 state:D stack:0 pid:7010 tgid:7010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ed7b1d84 r8:00000002 r7:60000013 r6:ed7b1d8c r5:85078000 r4:85078000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85078000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed7b1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a477c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f64b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd21000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859b778c r4:859b7400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859b778c r4:859f4880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85078000 r8:859f48ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:859f4880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859f4880 r8:8027f5e8 r7:ed7ade60 r6:8505c200 r5:85078000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed7b1fb0 to 0xed7b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ec9dc0 INFO: task kworker/0:496:7010 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: a417d000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:497:7047 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:497 state:D stack:0 pid:7047 tgid:7047 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ed79dd84 r8:00000002 r7:60000113 r6:ed79dd8c r5:8507b000 r4:8507b000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8507b000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed79de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a47900 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8507b000 r7:00000000 r6:83018000 r5:00001000 r4:7f677000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed275000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859b7b8c r4:859b7800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859b7b8c r4:859f4900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8507b000 r8:859f492c r7:82804d40 r6:dddced80 r5:dddceda0 r4:859f4900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859f4900 r8:8027f5e8 r7:ed7ade60 r6:8505c280 r5:8507b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed79dfb0 to 0xed79dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a47540 INFO: task kworker/0:497:7047 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: a417d000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:498:7049 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:498 state:D stack:0 pid:7049 tgid:7049 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ed7c1d84 r8:00000002 r7:60000113 r6:ed7c1d8c r5:8507a400 r4:8507a400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8507a400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed7c1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a47780 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8507a400 r7:00000000 r6:83018000 r5:00001000 r4:7f679000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed3ff000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859b7f8c r4:859b7c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859b7f8c r4:859f4980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8507a400 r8:859f49ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:859f4980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859f4980 r8:8027f5e8 r7:ed7ade60 r6:8505c300 r5:8507a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed7c1fb0 to 0xed7c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a47780 INFO: task kworker/0:498:7049 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: a446a000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:499:7051 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:499 state:D stack:0 pid:7051 tgid:7051 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ed7c9d84 r8:00000002 r7:60000113 r6:ed7c9d8c r5:85078c00 r4:85078c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85078c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed7c9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a47bc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85078c00 r7:00000000 r6:83018000 r5:00001000 r4:7f67b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed429000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e9fb8c r4:84e9f800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e9fb8c r4:859f4a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85078c00 r8:859f4a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:859f4a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859f4a00 r8:8027f5e8 r7:ed7ade60 r6:8505c380 r5:85078c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed7c9fb0 to 0xed7c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a47880 INFO: task kworker/0:499:7051 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: a454e000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:500:7053 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:500 state:D stack:0 pid:7053 tgid:7053 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ed7d1d84 r8:00000002 r7:60000113 r6:ed7d1d8c r5:8507bc00 r4:8507bc00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8507bc00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed7d1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a47c80 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8507bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f697000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed4f1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e9f78c r4:84e9f400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e9f78c r4:859f4a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8507bc00 r8:859f4aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:859f4a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859f4a80 r8:8027f5e8 r7:ed7ade60 r6:8505c400 r5:8507bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed7d1fb0 to 0xed7d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a47a40 INFO: task kworker/0:500:7053 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: a48bb000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:501:7055 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:501 state:D stack:0 pid:7055 tgid:7055 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ed7d9d84 r8:00000002 r7:60000113 r6:ed7d9d8c r5:8507c800 r4:8507c800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8507c800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed7d9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a6eb40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8507c800 r7:00000000 r6:83018000 r5:00001000 r4:7f69f000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5b9000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859b8f8c r4:859b8c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859b8f8c r4:859f4b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8507c800 r8:859f4b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:859f4b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859f4b00 r8:8027f5e8 r7:ed7ade60 r6:8505c480 r5:8507c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed7d9fb0 to 0xed7d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a47c40 INFO: task kworker/0:501:7055 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: a4c17000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:502:7058 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:502 state:D stack:0 pid:7058 tgid:7058 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ed7e1d84 r8:00000002 r7:60000013 r6:ed7e1d8c r5:8507d400 r4:8507d400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8507d400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed7e1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a47f40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8507d400 r7:00000000 r6:83018000 r5:00001000 r4:7f69b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed539000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859b878c r4:859b8400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859b878c r4:859f4b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8507d400 r8:859f4bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:859f4b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859f4b80 r8:8027f5e8 r7:ed7d9e60 r6:8505c500 r5:8507d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed7e1fb0 to 0xed7e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a47d40 INFO: task kworker/0:502:7058 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: a4c17000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:503:7059 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:503 state:D stack:0 pid:7059 tgid:7059 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ed7e5d84 r8:00000002 r7:60000013 r6:ed7e5d8c r5:8507ec00 r4:8507ec00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8507ec00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed7e5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a47180 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8507ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f69d000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed569000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859b8b8c r4:859b8800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859b8b8c r4:859f4c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8507ec00 r8:859f4c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:859f4c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859f4c00 r8:8027f5e8 r7:ed7d9e60 r6:8505c580 r5:8507ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed7e5fb0 to 0xed7e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a47d40 INFO: task kworker/0:503:7059 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: a4dae000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:504:7062 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:504 state:D stack:0 pid:7062 tgid:7062 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ed7e9d84 r8:00000002 r7:60000013 r6:ed7e9d8c r5:8507e000 r4:8507e000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8507e000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed7e9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a47080 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8507e000 r7:00000000 r6:83018000 r5:00001000 r4:7f6a1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5d9000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859b938c r4:859b9000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859b938c r4:859f4c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8507e000 r8:859f4cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:859f4c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859f4c80 r8:8027f5e8 r7:ed7d9e60 r6:8505c600 r5:8507e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed7e9fb0 to 0xed7e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a6e980 INFO: task kworker/0:504:7062 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: a4dae000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:505:7064 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:505 state:D stack:0 pid:7064 tgid:7064 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ed7f1d84 r8:00000002 r7:60000113 r6:ed7f1d8c r5:85980c00 r4:85980c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85980c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed7f1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e59480 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85980c00 r7:00000000 r6:83018000 r5:00001000 r4:7f6a9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed683000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859ba38c r4:859ba000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859ba38c r4:859f4d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85980c00 r8:859f4d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:859f4d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859f4d00 r8:8027f5e8 r7:ed7e9e60 r6:8505c680 r5:85980c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed7f1fb0 to 0xed7f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a47380 INFO: task kworker/0:505:7064 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: a4f75000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:506:7066 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:506 state:D stack:0 pid:7066 tgid:7066 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ed7f9d84 r8:00000002 r7:60000113 r6:ed7f9d8c r5:85ab0000 r4:85ab0000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85ab0000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed7f9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e36f40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85ab0000 r7:00000000 r6:83018000 r5:00001000 r4:7f6a3000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5fd000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859b978c r4:859b9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859b978c r4:859f4d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ab0000 r8:859f4dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:859f4d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859f4d80 r8:8027f5e8 r7:ed7f1e60 r6:8505c700 r5:85ab0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed7f9fb0 to 0xed7f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85058f40 INFO: task kworker/0:506:7066 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: a5311000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:507:7068 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:507 state:D stack:0 pid:7068 tgid:7068 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ed801d84 r8:00000002 r7:60000013 r6:ed801d8c r5:85ab1800 r4:85ab1800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85ab1800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed801e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e59100 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85ab1800 r7:00000000 r6:83018000 r5:00001000 r4:7f6a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed665000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859b9b8c r4:859b9800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859b9b8c r4:859f4e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ab1800 r8:859f4e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:859f4e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859f4e00 r8:8027f5e8 r7:ed7f1e60 r6:8505c780 r5:85ab1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed801fb0 to 0xed801ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e59080 INFO: task kworker/0:507:7068 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: a56e5000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:508:7069 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:508 state:D stack:0 pid:7069 tgid:7069 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ed805d84 r8:00000002 r7:60000113 r6:ed805d8c r5:85ab2400 r4:85ab2400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85ab2400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed805e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e59340 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85ab2400 r7:00000000 r6:83018000 r5:00001000 r4:7f6a7000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed673000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859b9f8c r4:859b9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859b9f8c r4:859f4e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ab2400 r8:859f4eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:859f4e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859f4e80 r8:8027f5e8 r7:ed7f1e60 r6:8505c800 r5:85ab2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed805fb0 to 0xed805ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e59280 INFO: task kworker/0:508:7069 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: a56e5000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:509:7072 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:509 state:D stack:0 pid:7072 tgid:7072 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ed811d84 r8:00000002 r7:60000013 r6:ed811d8c r5:85ab0c00 r4:85ab0c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85ab0c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed811e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e59980 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85ab0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f6b1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed6df000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859bb38c r4:859bb000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859bb38c r4:859f4f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ab0c00 r8:859f4f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:859f4f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859f4f00 r8:8027f5e8 r7:ed7f1e60 r6:8505c880 r5:85ab0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed811fb0 to 0xed811ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e591c0 INFO: task kworker/0:509:7072 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: a5886000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:510:7073 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:510 state:D stack:0 pid:7073 tgid:7073 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ed815d84 r8:00000002 r7:60000113 r6:ed815d8c r5:85ab4800 r4:85ab4800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85ab4800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed815e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e595c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85ab4800 r7:00000000 r6:83018000 r5:00001000 r4:7f6ab000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed699000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859ba78c r4:859ba400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859ba78c r4:859f4f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ab4800 r8:859f4fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:859f4f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859f4f80 r8:8027f5e8 r7:ed811e60 r6:8505c900 r5:85ab4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed815fb0 to 0xed815ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e59300 INFO: task kworker/0:510:7073 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: a5a96000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:511:7075 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:511 state:D stack:0 pid:7075 tgid:7075 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ed81dd84 r8:00000002 r7:60000013 r6:ed81dd8c r5:85ab3c00 r4:85ab3c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85ab3c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed81de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e59700 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85ab3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f6ad000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed6ad000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859bab8c r4:859ba800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859bab8c r4:859ff000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ab3c00 r8:859ff02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:859ff000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859ff000 r8:8027f5e8 r7:ed811e60 r6:8505c980 r5:85ab3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed81dfb0 to 0xed81dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e59440 INFO: task kworker/0:511:7075 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: a5a96000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:512:7077 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:512 state:D stack:0 pid:7077 tgid:7077 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ed7d5d84 r8:00000002 r7:60000113 r6:ed7d5d8c r5:84c94800 r4:84c94800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c94800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed7d5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e59840 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84c94800 r7:00000000 r6:83018000 r5:00001000 r4:7f6af000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed6d1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859baf8c r4:859bac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859baf8c r4:859ff080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c94800 r8:859ff0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:859ff080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859ff080 r8:8027f5e8 r7:ed811e60 r6:859ff100 r5:84c94800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed7d5fb0 to 0xed7d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e59580 INFO: task kworker/0:512:7077 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: a5d8a000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:513:7080 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:513 state:D stack:0 pid:7080 tgid:7080 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ed821d84 r8:00000002 r7:60000113 r6:ed821d8c r5:84c96000 r4:84c96000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c96000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed821e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e59e00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84c96000 r7:00000000 r6:83018000 r5:00001000 r4:7f6b7000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed70f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859bbb8c r4:859bb800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859bbb8c r4:859ff180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c96000 r8:859ff1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:859ff180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859ff180 r8:8027f5e8 r7:ed811e60 r6:859ff200 r5:84c96000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed821fb0 to 0xed821ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e59800 INFO: task kworker/0:513:7080 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: a6111000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:514:7081 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:514 state:D stack:0 pid:7081 tgid:7081 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ed7b9d84 r8:00000002 r7:60000113 r6:ed7b9d8c r5:84e89800 r4:84e89800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e89800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed7b9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e59b40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84e89800 r7:00000000 r6:83018000 r5:00001000 r4:7f6b3000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed6f3000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859bb78c r4:859bb400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859bb78c r4:859ff280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e89800 r8:859ff2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:859ff280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859ff280 r8:8027f5e8 r7:ed821e60 r6:859ff300 r5:84e89800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed7b9fb0 to 0xed7b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e59800 INFO: task kworker/0:514:7081 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: a6111000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:515:7085 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:515 state:D stack:0 pid:7085 tgid:7085 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ed831d84 r8:00000002 r7:60000113 r6:ed831d8c r5:84c55400 r4:84c55400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c55400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed831e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e46040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84c55400 r7:00000000 r6:83018000 r5:00001000 r4:7f6bb000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed74d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859bc38c r4:859bc000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859bc38c r4:859ff380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c55400 r8:859ff3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:859ff380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859ff380 r8:8027f5e8 r7:ed821e60 r6:859ff400 r5:84c55400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed831fb0 to 0xed831ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e59b80 INFO: task kworker/0:515:7085 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: a6918000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:516:7087 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:516 state:D stack:0 pid:7087 tgid:7087 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ed835d84 r8:00000002 r7:60000113 r6:ed835d8c r5:85788c00 r4:85788c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85788c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed835e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e59fc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85788c00 r7:00000000 r6:83018000 r5:00001000 r4:7f6b9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed723000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859bbf8c r4:859bbc00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859bbf8c r4:859ff480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85788c00 r8:859ff4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:859ff480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859ff480 r8:8027f5e8 r7:ed831e60 r6:859ff500 r5:85788c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed835fb0 to 0xed835ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e59800 INFO: task kworker/0:516:7087 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: a6cb0000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:517:7089 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:517 state:D stack:0 pid:7089 tgid:7089 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ed839d84 r8:00000002 r7:60000113 r6:ed839d8c r5:85788000 r4:85788000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85788000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed839e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e46500 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85788000 r7:00000000 r6:83018000 r5:00001000 r4:7f6bf000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed791000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859bcb8c r4:859bc800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859bcb8c r4:859ff580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85788000 r8:859ff5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:859ff580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859ff580 r8:8027f5e8 r7:ed831e60 r6:8505ca00 r5:85788000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed839fb0 to 0xed839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e46100 INFO: task kworker/0:517:7089 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: a6cb0000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:518:7090 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:518 state:D stack:0 pid:7090 tgid:7090 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ed829d84 r8:00000002 r7:60000113 r6:ed829d8c r5:85ab6000 r4:85ab6000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85ab6000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed829e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e46400 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85ab6000 r7:00000000 r6:83018000 r5:00001000 r4:7f6bd000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed775000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859bc78c r4:859bc400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859bc78c r4:859ff600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ab6000 r8:859ff62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:859ff600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859ff600 r8:8027f5e8 r7:ed839e60 r6:8505ca80 r5:85ab6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed829fb0 to 0xed829ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e46100 INFO: task kworker/0:518:7090 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: a726c000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:519:7094 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:519 state:D stack:0 pid:7094 tgid:7094 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ed855d84 r8:00000002 r7:60000113 r6:ed855d8c r5:85996c00 r4:85996c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85996c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed855e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e468c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85996c00 r7:00000000 r6:83018000 r5:00001000 r4:7f6c5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed85d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859bd78c r4:859bd400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859bd78c r4:859ff680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85996c00 r8:859ff6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:859ff680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859ff680 r8:8027f5e8 r7:ed839e60 r6:8505cb00 r5:85996c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed855fb0 to 0xed855ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e46300 INFO: task kworker/0:519:7094 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: a7609000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:520:7096 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:520 state:D stack:0 pid:7096 tgid:7096 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ed865d84 r8:00000002 r7:60000113 r6:ed865d8c r5:85ab5400 r4:85ab5400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85ab5400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed865e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e46600 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85ab5400 r7:00000000 r6:83018000 r5:00001000 r4:7f6c1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed841000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859bcf8c r4:859bcc00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859bcf8c r4:859ff700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ab5400 r8:859ff72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:859ff700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859ff700 r8:8027f5e8 r7:ed855e60 r6:8505cb80 r5:85ab5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed865fb0 to 0xed865ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e46380 INFO: task kworker/0:520:7096 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: a7609000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:521:7097 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:521 state:D stack:0 pid:7097 tgid:7097 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ed869d84 r8:00000002 r7:60000013 r6:ed869d8c r5:85079800 r4:85079800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85079800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed869e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e46740 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85079800 r7:00000000 r6:83018000 r5:00001000 r4:7f6c3000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed84d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859bd38c r4:859bd000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859bd38c r4:859ff780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85079800 r8:859ff7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:859ff780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859ff780 r8:8027f5e8 r7:ed855e60 r6:8505cc00 r5:85079800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed869fb0 to 0xed869ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e46380 INFO: task kworker/0:521:7097 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: a7913000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:522:7098 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:522 state:D stack:0 pid:7098 tgid:7098 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ed875d84 r8:00000002 r7:60000113 r6:ed875d8c r5:85ab3000 r4:85ab3000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85ab3000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed875e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e46a00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85ab3000 r7:00000000 r6:83018000 r5:00001000 r4:7f6c7000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed871000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859bdb8c r4:859bd800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859bdb8c r4:859ff800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ab3000 r8:859ff82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:859ff800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859ff800 r8:8027f5e8 r7:ed855e60 r6:8505cc80 r5:85ab3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed875fb0 to 0xed875ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e465c0 INFO: task kworker/0:522:7098 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: a79e8000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:523:7100 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:523 state:D stack:0 pid:7100 tgid:7100 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ed87dd84 r8:00000002 r7:60000113 r6:ed87dd8c r5:85ab8c00 r4:85ab8c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85ab8c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed87de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84713d40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85ab8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f6cb000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed89d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859be78c r4:859be400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859be78c r4:859ff880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ab8c00 r8:859ff8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:859ff880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859ff880 r8:8027f5e8 r7:ed875e60 r6:8505cd00 r5:85ab8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed87dfb0 to 0xed87dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e466c0 INFO: task kworker/0:523:7100 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: a7d7f000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:524:7103 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:524 state:D stack:0 pid:7103 tgid:7103 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ed899d84 r8:00000002 r7:60000013 r6:ed899d8c r5:85ab8000 r4:85ab8000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85ab8000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed899e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e46b40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f6c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed885000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859bdf8c r4:859bdc00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859bdf8c r4:859ff900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ab8000 r8:859ff92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:859ff900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859ff900 r8:8027f5e8 r7:ed87de60 r6:8505cd80 r5:85ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed899fb0 to 0xed899ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e46880 INFO: task kworker/0:524:7103 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: a7fcd000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:525:7105 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:525 state:D stack:0 pid:7105 tgid:7105 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ed8a9d84 r8:00000002 r7:60000013 r6:ed8a9d8c r5:85abbc00 r4:85abbc00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85abbc00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed8a9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e46c80 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85abbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f6cb000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed891000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859be38c r4:859be000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859be38c r4:859ff980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85abbc00 r8:859ff9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:859ff980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859ff980 r8:8027f5e8 r7:ed87de60 r6:8505ce00 r5:85abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed8a9fb0 to 0xed8a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e469c0 INFO: task kworker/0:525:7105 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: a808f000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:526:7107 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:526 state:D stack:0 pid:7107 tgid:7107 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ed8c1d84 r8:00000002 r7:60000113 r6:ed8c1d8c r5:85abb000 r4:85abb000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85abb000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed8c1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e46d80 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85abb000 r7:00000000 r6:83018000 r5:00001000 r4:7f6cf000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed8b1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859beb8c r4:859be800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859beb8c r4:859ffa00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85abb000 r8:859ffa2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:859ffa00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859ffa00 r8:8027f5e8 r7:ed87de60 r6:8505ce80 r5:85abb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed8c1fb0 to 0xed8c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e46d40 INFO: task kworker/0:526:7107 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: a849d000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:527:7112 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:527 state:D stack:0 pid:7112 tgid:7112 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ed8c9d84 r8:00000002 r7:60000013 r6:ed8c9d8c r5:85abc800 r4:85abc800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85abc800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed8c9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bd15c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85abc800 r7:00000000 r6:83018000 r5:00001000 r4:7f76b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed52b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859c078c r4:859c0400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859c078c r4:859ffa80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85abc800 r8:859ffaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:859ffa80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859ffa80 r8:8027f5e8 r7:ed8c1e60 r6:8505cf00 r5:85abc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed8c9fb0 to 0xed8c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e46d00 INFO: task kworker/0:527:7112 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: a86d7000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:528:7113 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:528 state:D stack:0 pid:7113 tgid:7113 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ed8cdd84 r8:00000002 r7:60000013 r6:ed8cdd8c r5:85aba400 r4:85aba400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85aba400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed8cde08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85050f40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85aba400 r7:00000000 r6:83018000 r5:00001000 r4:7f75f000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1cb000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859bff8c r4:859bfc00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859bff8c r4:859ffb00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85aba400 r8:859ffb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:859ffb00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859ffb00 r8:8027f5e8 r7:ed8c9e60 r6:8505cf80 r5:85aba400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed8cdfb0 to 0xed8cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e46d00 INFO: task kworker/0:528:7113 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: a8912000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:529:7219 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:529 state:D stack:0 pid:7219 tgid:7219 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eda75d84 r8:00000002 r7:60000113 r6:eda75d8c r5:85abec00 r4:85abec00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85abec00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eda75e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85050180 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85abec00 r7:00000000 r6:83018000 r5:00001000 r4:7f761000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed247000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84c98b8c r4:84c98800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84c98b8c r4:859ffb80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85abec00 r8:859ffbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:859ffb80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859ffb80 r8:8027f5e8 r7:ed8c9e60 r6:85924000 r5:85abec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeda75fb0 to 0xeda75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85050900 INFO: task kworker/0:529:7219 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: a8912000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:530:7221 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:530 state:D stack:0 pid:7221 tgid:7221 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eda7dd84 r8:00000002 r7:60000013 r6:eda7dd8c r5:85abd400 r4:85abd400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85abd400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eda7de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e59ac0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85abd400 r7:00000000 r6:83018000 r5:00001000 r4:7f763000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed2c5000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84c9878c r4:84c98400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84c9878c r4:859ffc00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85abd400 r8:859ffc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:859ffc00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859ffc00 r8:8027f5e8 r7:ed8c9e60 r6:85924080 r5:85abd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeda7dfb0 to 0xeda7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85050480 INFO: task kworker/0:530:7221 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: a8b83000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:531:7223 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:531 state:D stack:0 pid:7223 tgid:7223 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eda85d84 r8:00000002 r7:60000013 r6:eda85d8c r5:85ab9800 r4:85ab9800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85ab9800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eda85e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bd1100 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85ab9800 r7:00000000 r6:83018000 r5:00001000 r4:7f765000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed38b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84c9838c r4:84c98000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84c9838c r4:859ffc80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ab9800 r8:859ffcac r7:82804d40 r6:dddced80 r5:dddceda0 r4:859ffc80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859ffc80 r8:8027f5e8 r7:ed8c9e60 r6:85924100 r5:85ab9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeda85fb0 to 0xeda85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bd1140 INFO: task kworker/0:531:7223 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: a8b83000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:532:7225 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:532 state:D stack:0 pid:7225 tgid:7225 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eda8dd84 r8:00000002 r7:60000113 r6:eda8dd8c r5:85abe000 r4:85abe000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85abe000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eda8de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bd12c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85abe000 r7:00000000 r6:83018000 r5:00001000 r4:7f767000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed40b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e9ff8c r4:84e9fc00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e9ff8c r4:859ffd00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85abe000 r8:859ffd2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:859ffd00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859ffd00 r8:8027f5e8 r7:ed8c9e60 r6:85924180 r5:85abe000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeda8dfb0 to 0xeda8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bd1200 INFO: task kworker/0:532:7225 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: a8b83000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:533:7227 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:533 state:D stack:0 pid:7227 tgid:7227 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eda91d84 r8:00000002 r7:60000113 r6:eda91d8c r5:85ac0000 r4:85ac0000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85ac0000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eda91e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bd1480 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85ac0000 r7:00000000 r6:83018000 r5:00001000 r4:7f769000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed4ed000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859c038c r4:859c0000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859c038c r4:859ffd80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ac0000 r8:859ffdac r7:82804d40 r6:dddced80 r5:dddceda0 r4:859ffd80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859ffd80 r8:8027f5e8 r7:ed8c9e60 r6:85924200 r5:85ac0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeda91fb0 to 0xeda91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bd13c0 INFO: task kworker/0:533:7227 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: a8b83000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:534:7230 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:534 state:D stack:0 pid:7230 tgid:7230 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eda99d84 r8:00000002 r7:60000013 r6:eda99d8c r5:85ac1800 r4:85ac1800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85ac1800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eda99e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bd1700 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85ac1800 r7:00000000 r6:83018000 r5:00001000 r4:7f76d000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed577000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859c0b8c r4:859c0800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859c0b8c r4:859ffe00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ac1800 r8:859ffe2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:859ffe00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859ffe00 r8:8027f5e8 r7:ed8c9e60 r6:85924280 r5:85ac1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeda99fb0 to 0xeda99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bd1440 INFO: task kworker/0:534:7230 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: a8f50000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:535:7231 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:535 state:D stack:0 pid:7231 tgid:7231 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eda9dd84 r8:00000002 r7:60000013 r6:eda9dd8c r5:85ac2400 r4:85ac2400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85ac2400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eda9de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bd1b00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85ac2400 r7:00000000 r6:83018000 r5:00001000 r4:7f773000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed651000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859c178c r4:859c1400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859c178c r4:859ffe80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ac2400 r8:859ffeac r7:82804d40 r6:dddced80 r5:dddceda0 r4:859ffe80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859ffe80 r8:8027f5e8 r7:eda99e60 r6:85924300 r5:85ac2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeda9dfb0 to 0xeda9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bd1440 INFO: task kworker/0:535:7231 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: a90ec000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:536:7234 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:536 state:D stack:0 pid:7234 tgid:7234 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edaa1d84 r8:00000002 r7:60000013 r6:edaa1d8c r5:85ac3000 r4:85ac3000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85ac3000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edaa1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bd1800 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85ac3000 r7:00000000 r6:83018000 r5:00001000 r4:7f76f000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5e7000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859c0f8c r4:859c0c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859c0f8c r4:859fff00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ac3000 r8:859fff2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:859fff00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859fff00 r8:8027f5e8 r7:eda9de60 r6:85924380 r5:85ac3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedaa1fb0 to 0xedaa1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bd1740 INFO: task kworker/0:536:7234 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: a9237000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:537:7236 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:537 state:D stack:0 pid:7236 tgid:7236 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edaa5d84 r8:00000002 r7:60000113 r6:edaa5d8c r5:85ac3c00 r4:85ac3c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85ac3c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edaa5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bd19c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85ac3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f771000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed629000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859c138c r4:859c1000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859c138c r4:859fff80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ac3c00 r8:859fffac r7:82804d40 r6:dddced80 r5:dddceda0 r4:859fff80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859fff80 r8:8027f5e8 r7:eda9de60 r6:85924400 r5:85ac3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedaa5fb0 to 0xedaa5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bd17c0 INFO: task kworker/0:537:7236 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: a93e6000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:538:7238 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:538 state:D stack:0 pid:7238 tgid:7238 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edaa9d84 r8:00000002 r7:60000013 r6:edaa9d8c r5:85ac4800 r4:85ac4800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85ac4800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edaa9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bd1c40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85ac4800 r7:00000000 r6:83018000 r5:00001000 r4:7f775000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed65d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859c1b8c r4:859c1800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859c1b8c r4:85a66000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ac4800 r8:85a6602c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a66000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a66000 r8:8027f5e8 r7:eda9de60 r6:85924480 r5:85ac4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedaa9fb0 to 0xedaa9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bd1580 INFO: task kworker/0:538:7238 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: a95c8000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:539:7240 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:539 state:D stack:0 pid:7240 tgid:7240 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edaadd84 r8:00000002 r7:60000113 r6:edaadd8c r5:85ac5400 r4:85ac5400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85ac5400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edaade08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bd1dc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85ac5400 r7:00000000 r6:83018000 r5:00001000 r4:7f777000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed675000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859c1f8c r4:859c1c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859c1f8c r4:85a66080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ac5400 r8:85a660ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a66080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a66080 r8:8027f5e8 r7:edaa9e60 r6:85924500 r5:85ac5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedaadfb0 to 0xedaadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bd1900 INFO: task kworker/0:539:7240 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: a95c8000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 INFO: task kworker/0:540:7242 blocked for more than 476 seconds. r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edab1e08 r5:00001000 r4:ed6cf000 r4:85a66100 r4:85bd1bc0 INFO: task kworker/0:540:7242 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: a96ff000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:541:7244 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:541 state:D stack:0 pid:7244 tgid:7244 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edab5d84 r8:00000002 r7:60000113 r6:edab5d8c r5:85ac6c00 r4:85ac6c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85ac6c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edab5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r9:83018005 r8:85ac6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f779000 r5:00001000 r4:ed6a5000 r10:61c88647 r9:85ac6c00 r8:85a661ac r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:85c10000 r4:82918808 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe884dd28 to 0xe884dd70) r4:00000000 r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:543:7248 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:543 state:D stack:0 pid:7248 tgid:7248 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edac5d84 r8:00000002 r7:60000113 r6:edac5d8c r5:85c11800 r4:85c11800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c11800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edac5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a64600 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85c11800 r7:00000000 r6:83018000 r5:00001000 r4:7f787000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed7bd000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859c3f8c r4:859c3c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859c3f8c r4:85a66280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c11800 r8:85a662ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a66280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a66280 r8:8027f5e8 r7:edabde60 r6:85924700 r5:85c11800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedac5fb0 to 0xedac5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a64000 INFO: task kworker/0:543:7248 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed70b000 r5:859c2f8c r4:859c2c00 r10:61c88647 r9:85c12400 r8:85a6632c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8454db00 Exception stack(0xe884dfb0 to 0xe884dff8) r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:545:7252 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:545 state:D stack:0 pid:7252 tgid:7252 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edad5d84 r8:00000002 r7:60000013 r6:edad5d8c r5:85c14800 r4:85c14800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c14800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edad5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a64480 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85c14800 r7:00000000 r6:83018000 r5:00001000 r4:7f781000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed725000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859c338c r4:859c3000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859c338c r4:85a66380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c14800 r8:85a663ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a66380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a66380 r8:8027f5e8 r7:edac5e60 r6:85924800 r5:85c14800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedad5fb0 to 0xedad5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a64180 INFO: task kworker/0:545:7252 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: aa0e2000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ed773000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:82ac11a4 r4:00000000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 INFO: task kworker/0:547:7255 blocked for more than 476 seconds. r4:8578ec00 [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ed7a3000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8578ec00 r8:85a664ac r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:548:7260 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:548 state:D stack:0 pid:7260 tgid:7260 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edaddd84 r8:00000002 r7:60000113 r6:edaddd8c r5:8578a400 r4:8578a400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8578a400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edadde08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a64980 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8578a400 r7:00000000 r6:83018000 r5:00001000 r4:7f789000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed7eb000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859c438c r4:859c4000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859c438c r4:85a66580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8578a400 r8:85a665ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a66580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a66580 r8:8027f5e8 r7:edac5e60 r6:85a66600 r5:8578a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedaddfb0 to 0xedaddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a64880 INFO: task kworker/0:548:7260 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd60: 80230ad4 80239bb0 80070013 ffffffff r5:00001000 r4:e884f000 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e5aa80 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ed80b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:859c478c r4:85a66680 Exception stack(0xed845fb0 to 0xed845ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a64880 INFO: task kworker/0:549:7261 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: aa9ea000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ed893000 r5:859c578c r4:859c5400 r4:00000001 INFO: task kworker/0:550:7263 is blocked on a mutex likely owned by task kworker/1:174:3878. dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8578b000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edaf1e08 r5:00001000 r4:ed825000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859c4b8c r4:85a66880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8578b000 r8:85a668ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a66880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a66880 r8:8027f5e8 r7:edaede60 r6:85a66900 r5:8578b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedaf1fb0 to 0xedaf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a64b00 INFO: task kworker/0:551:7264 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: ab05a000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Not tainted 6.15.0-syzkaller #0 r5:8578bc00 r4:82918808 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:ed85f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:859c4f8c r4:859c4c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:552:7267 is blocked on a mutex likely owned by task kworker/1:174:3878. dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:8291880c r9:edaf9d84 r8:00000002 r7:60000013 r6:edaf9d8c r5:85789800 r4:85789800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85789800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edaf9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a64f80 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85789800 r7:00000000 r6:83018000 r5:00001000 r4:7f791000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed877000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859c538c r4:859c5000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859c538c r4:85a66a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85789800 r8:85a66aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a66a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a66a80 r8:8027f5e8 r7:edaede60 r6:85a66b00 r5:85789800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedaf9fb0 to 0xedaf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bd1bc0 INFO: task kworker/0:553:7268 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Not tainted 6.15.0-syzkaller #0 r4:00000000 r5:00001000 r4:ed8a1000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: ab536000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a4c700 r5:00001000 r4:ed8ef000 r7:dddced80 r6:83018000 r5:859c678c r4:85a66c80 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe884dd28 to 0xe884dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:556:7275 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:556 state:D stack:0 pid:7275 tgid:7275 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edb05d84 r8:00000002 r7:60000013 r6:edb05d8c r5:847a0c00 r4:847a0c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847a0c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edb05e08 r9:83018005 r8:847a0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f799000 r5:00001000 r4:ed8e1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859c638c r4:859c6000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859c638c r4:85a66d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847a0c00 r8:85a66dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a66d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a66d80 r8:8027f5e8 r7:edb01e60 r6:85a66e00 r5:847a0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedb05fb0 to 0xedb05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:8454db00 r4:84e5aa80 r4:847a1800 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a4c880 r5:00001000 r4:ed8ff000 r7:dddced80 r6:83018000 r5:859c6b8c r4:85a66e80 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a4c500 INFO: task kworker/0:557:7277 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edb09e08 r5:00001000 r4:ed90b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847a3000 r4:00000000 r5:00001000 r4:dfcd1000 r5:859c738c r4:859c7000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85a4c680 INFO: task kworker/0:559:7281 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: ac0cf000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:560:7283 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:560 state:D stack:0 pid:7283 tgid:7283 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec9fd000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:859c778c r4:85a56180 Exception stack(0xedb11fb0 to 0xedb11ff8) task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11a4 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ed919000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859c7b8c r4:859c7800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859c7b8c r4:85a56280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847a4800 r8:85a562ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a56280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a56280 r8:8027f5e8 r7:edb11e60 r6:85a56300 r5:847a4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedb15fb0 to 0xedb15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a4cb80 INFO: task kworker/0:561:7285 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: ac49e000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:562:7287 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:562 state:D stack:0 pid:7287 tgid:7287 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edb19d84 r8:00000002 r7:60000013 r6:edb19d8c r5:847a5400 r4:847a5400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847a5400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edb19e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a4c280 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:847a5400 r7:00000000 r6:83018000 r5:00001000 r4:7f7a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed957000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859c7f8c r4:859c7c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859c7f8c r4:85a56380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847a5400 r8:85a563ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a56380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a56380 r8:8027f5e8 r7:edb15e60 r6:85a56400 r5:847a5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedb19fb0 to 0xedb19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a4cf00 INFO: task kworker/0:562:7287 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: ac49e000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:563:7289 blocked for more than 477 seconds. r5:847a6000 r4:82918808 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xedb1dfb0 to 0xedb1dff8) task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: ac6fd000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 Exception stack(0xe884dfb0 to 0xe884dff8) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85190000 r9:83018005 r8:85190000 r7:00000000 r6:83018000 r5:00001000 r4:7f7ab000 r10:61c88647 r9:85190000 r8:85a566ac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847100c0 INFO: task kworker/0:565:7293 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: ac786000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) task:kworker/0:566 state:D stack:0 pid:7294 tgid:7294 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:eda1f000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/0:567 state:D stack:0 pid:7296 tgid:7296 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85193000 r7:00000000 r6:83018000 r5:00001000 r4:7f7ad000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed98d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859d4f8c r4:859d4c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859d4f8c r4:85a56880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85193000 r8:85a568ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a56880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a56880 r8:8027f5e8 r7:edb2de60 r6:85a56900 r5:85193000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedb31fb0 to 0xedb31ff8) 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: acdc7000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84710a80 r5:00001000 r4:eda11000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xedb21fb0 to 0xedb21ff8) task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad4 80239bb0 80070013 ffffffff r4:e884ddc0 r5:00001000 r4:e884f000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xe884dfb0 to 0xe884dff8) INFO: task kworker/0:569:7303 blocked for more than 477 seconds. r10:8291880c r9:edb41d84 r8:00000002 r7:60000113 r6:edb41d8c r5:85c13000 r5:85c13000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edb41e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84710c80 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85c13000 r7:00000000 r6:83018000 r5:00001000 r4:7f7b7000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda33000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859d5b8c r4:859d5800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859d5b8c r4:85a56a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c13000 r8:85a56a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a56a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a56a00 r8:8027f5e8 r7:edb2de60 r6:85924980 r5:85c13000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedb41fb0 to 0xedb41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847109c0 INFO: task kworker/0:569:7303 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: ad00e000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eda4f000 r5:859d638c r4:859d6000 r4:85a56a80 Exception stack(0xedb49fb0 to 0xedb49ff8) task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11a4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85c15400 r4:82918808 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eda41000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:859d5f8c r4:85a56b00 Exception stack(0xedb4dfb0 to 0xedb4dff8) task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:572:7310 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:572 state:D stack:0 pid:7310 tgid:7310 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edb5dd84 r8:00000002 r7:60000113 r6:edb5dd8c r5:85c19800 r4:85c19800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c19800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edb5de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84710700 r4:00000000 r9:83018005 r8:85c19800 r7:00000000 r6:83018000 r5:00001000 r4:7f7bd000 r5:00001000 r4:eda5b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:859d678c r4:85a56b80 Exception stack(0xedb5dfb0 to 0xedb5dff8) task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:85c18000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edb61e08 r5:00001000 r4:edbb5000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:859d838c r4:85a56c00 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad4 80239bb0 80070013 ffffffff r4:e884ddc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:574:7312 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:574 state:D stack:0 pid:7312 tgid:7312 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edb69d84 r8:00000002 r7:60000013 r6:edb69d8c r5:85c1a400 r4:85c1a400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c1a400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edb69e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c08500 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85c1a400 r7:00000000 r6:83018000 r5:00001000 r4:7f7bf000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda65000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859d6b8c r4:859d6800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859d6b8c r4:85a56c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c1a400 r8:85a56cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a56c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a56c80 r8:8027f5e8 r7:edb61e60 r6:85924c00 r5:85c1a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedb69fb0 to 0xedb69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84710800 INFO: task kworker/0:574:7312 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: add2b000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r5:00001000 r4:e884f000 r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 r4:00000001 r4:84e5aa80 Workqueue: events bpf_prog_free_deferred r5:85c1c800 r4:82918808 r4:00000000 r9:83018005 r8:85c1c800 r7:00000000 r6:83018000 r5:00001000 r4:7f7c1000 r5:00001000 r4:edb65000 r7:dddced80 r6:83018000 r5:859d6f8c r4:85a56d00 r10:00000000 r9:85a56d00 r8:8027f5e8 r7:edb61e60 r6:85924c80 r5:85c1c800 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ee7e00 INFO: task kworker/0:575:7314 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: adfd4000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:576:7316 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:576 state:D stack:0 pid:7316 tgid:7316 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edb81d84 r8:00000002 r7:60000113 r6:edb81d8c r5:85c1b000 r4:85c1b000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c1b000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edb81e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d9f040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85c1b000 r7:00000000 r6:83018000 r5:00001000 r4:7f7c3000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edb75000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859d738c r4:859d7000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859d738c r4:85a56d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c1b000 r8:85a56dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a56d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a56d80 r8:8027f5e8 r7:edb61e60 r6:85924d00 r5:85c1b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedb81fb0 to 0xedb81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ee7e00 INFO: task kworker/0:576:7316 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: ae238000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:edb89000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859d778c r4:859d7400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe884dd28 to 0xe884dd70) r4:82ac11a4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85c1ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f7c7000 r5:00001000 r4:edb99000 r5:859d7b8c r4:859d7800 r4:85a56e80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 dd20: aeea1000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:579:7323 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:579 state:D stack:0 pid:7323 tgid:7323 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edbbdd84 r8:00000002 r7:60000113 r6:edbbdd8c r5:85c1bc00 r4:85c1bc00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c1bc00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edbbde08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r4:00000000 r5:00001000 r4:edba5000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85c1bc00 r8:85a56f2c r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11a4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:edbc5000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:859d878c r4:85a56f80 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd20: af627000 e47a4000 00000001 80239b98 7f1cb000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/0:581 state:D stack:0 pid:7327 tgid:7327 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edbe5d84 r8:00000002 r7:60000013 r6:edbe5d8c r5:85ac0c00 r4:85ac0c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85ac0c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edbe5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d9fa80 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85ac0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f7d1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edbe1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859d8f8c r4:859d8c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859d8f8c r4:84715000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ac0c00 r8:8471502c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84715000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84715000 r8:8027f5e8 r7:edbcde60 r6:85924f80 r5:85ac0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedbe5fb0 to 0xedbe5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d9f680 INFO: task kworker/0:581:7327 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: afe8d000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:edbd5000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:859d8b8c r4:84715080 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd20: afe8d000 e47a4000 00000001 80239b98 7f1cb000 00000001 r4:00000000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:583:7331 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:583 state:D stack:0 pid:7331 tgid:7331 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edbd9d84 r8:00000002 r7:60000113 r6:edbd9d8c r5:85193c00 r4:85193c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85193c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edbd9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d9fb40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85193c00 r7:00000000 r6:83018000 r5:00001000 r4:7f7d3000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edbf1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859d938c r4:859d9000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859d938c r4:84715180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85193c00 r8:847151ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84715180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84715180 r8:8027f5e8 r7:edbe5e60 r6:84715200 r5:85193c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedbd9fb0 to 0xedbd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d9fa00 INFO: task kworker/0:583:7331 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: afe8d000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:584 state:D stack:0 pid:7332 tgid:7332 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edbf5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d9fd80 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85194800 r7:00000000 r6:83018000 r5:00001000 r4:7f7d5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edbfd000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859d978c r4:859d9400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85194800 r8:847152ac r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11a4 r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc09000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad4 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:586:7338 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:586 state:D stack:0 pid:7338 tgid:7338 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edc0dd84 r8:00000002 r7:60000113 r6:edc0dd8c r5:85196000 r4:85196000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85196000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edc0de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a58040 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85196000 r7:00000000 r6:83018000 r5:00001000 r4:7f7db000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc21000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859da38c r4:859da000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859da38c r4:84715480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85196000 r8:847154ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84715480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84715480 r8:8027f5e8 r7:edc01e60 r6:84715500 r5:85196000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedc0dfb0 to 0xedc0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d9fc80 INFO: task kworker/0:586:7338 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: b0660000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:8291880c r9:edb35d84 r8:00000002 r7:60000013 r6:edb35d8c r5:85196c00 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d9ffc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85196c00 r7:00000000 r6:83018000 r5:00001000 r4:7f7d9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc15000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859d9f8c r4:859d9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859d9f8c r4:84715580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85196c00 r8:847155ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84715580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84715580 r8:8027f5e8 r7:edc0de60 r6:84715600 r5:85196c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedb35fb0 to 0xedb35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a58080 INFO: task kworker/0:587:7339 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: b0660000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:588 state:D stack:0 pid:7342 tgid:7342 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc2d000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84715680 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd20: b0c46000 e47a4000 00000001 80239b98 7f1cb000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:847a6c00 r4:82918808 r4:00000000 r4:00000000 r5:00001000 r4:edc39000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:859dab8c r4:84715780 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a58200 INFO: task kworker/0:589:7343 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: b0c46000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:590:7345 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:590 state:D stack:0 pid:7345 tgid:7345 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edc45d84 r8:00000002 r7:60000013 r6:edc45d8c r5:85188c00 r4:85188c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85188c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edc45e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a58880 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85188c00 r7:00000000 r6:83018000 r5:00001000 r4:7f7e3000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc4d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859daf8c r4:859dac00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859daf8c r4:84715880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85188c00 r8:847158ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84715880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84715880 r8:8027f5e8 r7:edc25e60 r6:84715900 r5:85188c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedc45fb0 to 0xedc45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a583c0 INFO: task kworker/0:590:7345 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: b123a000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:8518a400 r4:82918808 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a58e40 r5:00001000 r4:edc71000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:859dbb8c r4:859db800 r10:61c88647 r9:8518a400 r8:847159ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: b123a000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:592:7350 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:592 state:D stack:0 pid:7350 tgid:7350 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edc69d84 r8:00000002 r7:60000013 r6:edc69d8c r5:8518b000 r4:8518b000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8518b000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edc69e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a58ac0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8518b000 r7:00000000 r6:83018000 r5:00001000 r4:7f7e5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc59000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859db38c r4:859db000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84715a80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:82ac11a4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:8291880c r9:edc75d84 r8:00000002 r7:60000013 r6:edc75d8c r5:85189800 r4:00000000 r4:00000000 r5:00001000 r4:edc65000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:859db78c r4:859db400 r10:61c88647 r9:85189800 r8:84715bac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: b1d2f000 e47a4000 00000001 80239b98 7f1cb000 00000001 r4:e884ddc0 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:594:7354 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:594 state:D stack:0 pid:7354 tgid:7354 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edc81d84 r8:00000002 r7:60000013 r6:edc81d8c r5:8518c800 r4:8518c800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8518c800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edc81e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a58440 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8518c800 r7:00000000 r6:83018000 r5:00001000 r4:7f7eb000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc7d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859dbf8c r4:859dbc00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859dbf8c r4:84715c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8518c800 r8:84715cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84715c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84715c80 r8:8027f5e8 r7:edc5de60 r6:84715d00 r5:8518c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedc81fb0 to 0xedc81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a58cc0 INFO: task kworker/0:594:7354 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: b1d2f000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 r5:80070013 r4:80239bb0 r4:e884ddc0 r5:00001000 r4:e884f000 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:595 state:D stack:0 pid:7356 tgid:7356 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edc51e08 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edcb1000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84715d80 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe884dd28 to 0xe884dd70) r4:82ac11a4 r4:00000000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:8518d400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edc31e08 r5:00001000 r4:edc89000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85c0c38c r4:84715e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8518d400 r8:84715eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84715e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84715e80 r8:8027f5e8 r7:edc51e60 r6:84715f00 r5:8518d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedc31fb0 to 0xedc31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8593b240 INFO: task kworker/0:596:7359 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: b2550000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:597:7361 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:597 state:D stack:0 pid:7361 tgid:7361 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edc9dd84 r8:00000002 r7:60000013 r6:edc9dd8c r5:8518e000 r4:8518e000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8518e000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edc9de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593b300 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8518e000 r7:00000000 r6:83018000 r5:00001000 r4:7f7ef000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc91000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c0c78c r4:85c0c400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c0c78c r4:84715f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe884dd28 to 0xe884dd70) r4:82ac11a4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:598 state:D stack:0 pid:7363 tgid:7363 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edca9e08 r9:83018005 r8:8518ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f7f1000 r5:00001000 r4:edc99000 r7:dddced80 r6:83018000 r5:85c0cb8c r4:85929080 r10:61c88647 r9:8518ec00 r8:859290ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85929080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85929080 r8:8027f5e8 r7:edc51e60 r6:85929100 r5:8518ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedca9fb0 to 0xedca9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8593b340 INFO: task kworker/0:598:7363 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: b291d000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:599:7364 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:599 state:D stack:0 pid:7364 tgid:7364 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edcb5d84 r8:00000002 r7:60000013 r6:edcb5d8c r5:85188000 r4:85188000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85188000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edcb5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593b600 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85188000 r7:00000000 r6:83018000 r5:00001000 r4:7f7f3000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edca5000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c0cf8c r4:85c0cc00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c0cf8c r4:85929180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85188000 r8:859291ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85929180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85929180 r8:8027f5e8 r7:edc51e60 r6:85929200 r5:85188000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedcb5fb0 to 0xedcb5ff8) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8593b480 INFO: task kworker/0:599:7364 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: b291d000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:600:7367 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:600 state:D stack:0 pid:7367 tgid:7367 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edcc1d84 r8:00000002 r7:60000113 r6:edcc1d8c r5:85192400 r4:85192400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85192400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edcc1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593b940 r4:00000000 r9:83018005 r8:85192400 r7:00000000 r6:83018000 r5:00001000 r4:7f7f7000 r5:00001000 r4:edcbd000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c0d78c r4:85c0d400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c0d78c r4:85929280 r10:61c88647 r9:85192400 r8:859292ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 1fa0: 00000000 00000000 00000000 00000000 r4:8593b640 task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:601:7368 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:601 state:D stack:0 pid:7368 tgid:7368 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edcd5d84 r8:00000002 r7:60000113 r6:edcd5d8c r5:859a0000 r4:859a0000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:859a0000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edcd5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593bbc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:859a0000 r7:00000000 r6:83018000 r5:00001000 r4:7f7f9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edcc9000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c0db8c r4:85c0d800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c0db8c r4:85929380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859a0000 r8:859293ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85929380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85929380 r8:8027f5e8 r7:edcc1e60 r6:85929400 r5:859a0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedcd5fb0 to 0xedcd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8593b740 INFO: task kworker/0:601:7368 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: b33da000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:602:7371 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:602 state:D stack:0 pid:7371 tgid:7371 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: r4:859a0c00 r5:859a0c00 r4:82918808 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edccde08 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:edd15000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c0f38c r4:85c0f000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c0f38c r4:85929480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859a0c00 r8:859294ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85929480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85929480 r8:8027f5e8 r7:edcd5e60 r6:85929500 r5:859a0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedccdfb0 to 0xedccdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8593b8c0 INFO: task kworker/0:602:7371 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: b33da000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:603:7372 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:603 state:D stack:0 pid:7372 tgid:7372 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edce9d84 r8:00000002 r7:60000013 r6:edce9d8c r5:859a1800 r4:859a1800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:859a1800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edce9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593bcc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:859a1800 r7:00000000 r6:83018000 r5:00001000 r4:7f7fb000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edcd9000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c0df8c r4:85c0dc00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c0df8c r4:85929580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859a1800 r8:859295ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85929580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85929580 r8:8027f5e8 r7:edccde60 r6:85929600 r5:859a1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedce9fb0 to 0xedce9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8593b9c0 INFO: task kworker/0:603:7372 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: b33da000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:604:7375 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:604 state:D stack:0 pid:7375 tgid:7375 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edcf5d84 r8:00000002 r7:60000113 r6:edcf5d8c r5:859a2400 r4:859a2400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:859a2400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edcf5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593be40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:859a2400 r7:00000000 r6:83018000 r5:00001000 r4:7f7fd000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edce5000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c0e38c r4:85c0e000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c0e38c r4:85929680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859a2400 r8:859296ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85929680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85929680 r8:8027f5e8 r7:edccde60 r6:85929700 r5:859a2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedcf5fb0 to 0xedcf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8593bc40 INFO: task kworker/0:604:7375 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: b33da000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:605:7376 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:605 state:D stack:0 pid:7376 tgid:7376 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edd01d84 r8:00000002 r7:60000013 r6:edd01d8c r5:859a3000 r4:859a3000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:859a3000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edd01e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593bfc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:859a3000 r7:00000000 r6:83018000 r5:00001000 r4:7f7ff000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edcf1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c0e78c r4:85c0e400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c0e78c r4:85929780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859a3000 r8:859297ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85929780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85929780 r8:8027f5e8 r7:edccde60 r6:85929800 r5:859a3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedd01fb0 to 0xedd01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a58640 INFO: task kworker/0:605:7376 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: b3a5b000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:606:7378 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:606 state:D stack:0 pid:7378 tgid:7378 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edcddd84 r8:00000002 r7:60000113 r6:edcddd8c r5:859a3c00 r4:859a3c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:859a3c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edcdde08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a58f40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:859a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f801000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edcfd000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c0eb8c r4:85c0e800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c0eb8c r4:85929880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859a3c00 r8:859298ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85929880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85929880 r8:8027f5e8 r7:edccde60 r6:85929900 r5:859a3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedcddfb0 to 0xedcddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a58640 INFO: task kworker/0:606:7378 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: b3ee0000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 r5:00001000 r4:e884f000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:859a4800 r7:00000000 r6:83018000 r5:00001000 r4:7f803000 r5:00001000 r4:edd09000 r7:dddced80 r6:83018000 r5:85c0ef8c r4:85929980 r10:00000000 r9:85929980 r8:8027f5e8 r7:edccde60 r6:85929a00 r5:859a4800 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85869080 INFO: task kworker/0:607:7380 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: b4478000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:608:7382 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:608 state:D stack:0 pid:7382 tgid:7382 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edd19d84 r8:00000002 r7:60000113 r6:edd19d8c r5:859a5400 r4:859a5400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:859a5400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edd19e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858695c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:859a5400 r7:00000000 r6:83018000 r5:00001000 r4:7f809000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd2d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c0fb8c r4:85c0f800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c0fb8c r4:85929a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859a5400 r8:85929aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85929a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85929a80 r8:8027f5e8 r7:edccde60 r6:85929b00 r5:859a5400 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 r4:e884ddc0 r4:00000000 r5:00001000 r4:e884f000 r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:609:7384 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:609 state:D stack:0 pid:7384 tgid:7384 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edd25d84 r8:00000002 r7:60000113 r6:edd25d8c r5:859a6000 r4:859a6000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:859a6000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edd25e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85869480 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:859a6000 r7:00000000 r6:83018000 r5:00001000 r4:7f807000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd21000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c0f78c r4:85c0f400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c0f78c r4:85929b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859a6000 r8:85929bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85929b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85929b80 r8:8027f5e8 r7:edd19e60 r6:85929c00 r5:859a6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedd25fb0 to 0xedd25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85869280 INFO: task kworker/0:609:7384 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: b4478000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:610:7388 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:610 state:D stack:0 pid:7388 tgid:7388 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edd31d84 r8:00000002 r7:60000113 r6:edd31d8c r5:859a6c00 r4:859a6c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:859a6c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edd31e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85869980 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:859a6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f765000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed545000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c5038c r4:85c50000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c5038c r4:85929c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859a6c00 r8:85929cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85929c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85929c80 r8:8027f5e8 r7:edd19e60 r6:85929d00 r5:859a6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedd31fb0 to 0xedd31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85869440 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:82ac11a4 r4:00000000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8454db00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:84d78000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d78000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edae1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85869880 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d78000 r7:00000000 r6:83018000 r5:00001000 r4:7f763000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed4e1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c0ff8c r4:85c0fc00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c0ff8c r4:85929d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d78000 r8:85929dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85929d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85929d80 r8:8027f5e8 r7:edd31e60 r6:85929e00 r5:84d78000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedae1fb0 to 0xedae1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85869440 INFO: task kworker/0:611:7392 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: b5299000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84e5aa80 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8291880c r9:edac1d84 r8:00000002 r7:60000113 r6:edac1d8c r5:84d78c00 [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:ed6d3000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85c5078c r4:85929e80 r4:85929e80 Exception stack(0xedac1fb0 to 0xedac1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85869780 INFO: task kworker/0:612:7396 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: b5299000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:613:7402 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:613 state:D stack:0 pid:7402 tgid:7402 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edd3dd84 r8:00000002 r7:60000113 r6:edd3dd8c r5:84d79800 r4:84d79800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d79800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edd3de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85869dc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d79800 r7:00000000 r6:83018000 r5:00001000 r4:7f773000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed6f7000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c50b8c r4:85c50800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c50b8c r4:85929f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d79800 r8:85929fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85929f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85929f80 r8:8027f5e8 r7:edac1e60 r6:85937000 r5:84d79800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedd3dfb0 to 0xedd3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85869ac0 INFO: task kworker/0:613:7402 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: b574e000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:614:7405 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:614 state:D stack:0 pid:7405 tgid:7405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edd41d84 r8:00000002 r7:60000113 r6:edd41d8c r5:84d7b000 r4:84d7b000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d7b000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edd41e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d9cc80 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d7b000 r7:00000000 r6:83018000 r5:00001000 r4:7f77b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed7dd000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c5138c r4:85c51000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c5138c r4:85937080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d7b000 r8:859370ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85937080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85937080 r8:8027f5e8 r7:edd3de60 r6:85937100 r5:84d7b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedd41fb0 to 0xedd41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85869bc0 INFO: task kworker/0:614:7405 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: b5dc9000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:615:7406 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:615 state:D stack:0 pid:7406 tgid:7406 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edd45d84 r8:00000002 r7:60000113 r6:edd45d8c r5:84d7bc00 r4:84d7bc00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d7bc00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edd45e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85869a40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d7bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f779000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed7b3000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c50f8c r4:85c50c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c50f8c r4:85937180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d7bc00 r8:859371ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85937180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85937180 r8:8027f5e8 r7:edd41e60 r6:85937200 r5:84d7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedd45fb0 to 0xedd45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85869bc0 INFO: task kworker/0:615:7406 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: b5dc9000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:616:7410 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:616 state:D stack:0 pid:7410 tgid:7410 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edacdd84 r8:00000002 r7:60000113 r6:edacdd8c r5:84d7c800 r4:84d7c800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d7c800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edacde08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a5e840 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d7c800 r7:00000000 r6:83018000 r5:00001000 r4:7f811000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed173000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c52f8c r4:85c52c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:84d9c400 Workqueue: events bpf_prog_free_deferred Exception stack(0xe884dd28 to 0xe884dd70) dd20: b5dc9000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:617:7493 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:617 state:D stack:0 pid:7493 tgid:7493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:eddedd84 r8:00000002 r7:60000113 r6:eddedd8c r5:84d7e000 r4:84d7e000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d7e000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eddede08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c0aa80 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d7e000 r7:00000000 r6:83018000 r5:00001000 r4:7f819000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edb79000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c5338c r4:85c53000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c5338c r4:85937380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d7e000 r8:859373ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85937380 Exception stack(0xeddedfb0 to 0xeddedff8) task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad4 80239bb0 80070013 ffffffff [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xe884dfb0 to 0xe884dff8) Workqueue: events bpf_prog_free_deferred [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:edb8d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85c5378c r4:85937480 r10:61c88647 r9:84d7ec00 r8:859374ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85937480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85937480 r8:8027f5e8 r7:eddede60 r6:85937500 r5:84d7ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedde1fb0 to 0xedde1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a5ee80 INFO: task kworker/0:618:7495 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: b5eb0000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:619 state:D stack:0 pid:7498 tgid:7498 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:edbc9000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ce67c0 INFO: task kworker/0:619:7498 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: b62e9000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:620:7500 blocked for more than 478 seconds. [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Workqueue: events bpf_prog_free_deferred r4:82ac11a4 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) task:kworker/0:621 state:D stack:0 pid:7503 tgid:7503 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:851b0000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851b0000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eddf9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bfaf00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:edc9f000 r7:dddced80 r6:83018000 r5:84c99b8c r4:85937780 r10:00000000 r9:85937780 r8:8027f5e8 r7:eddf1e60 r6:85937800 r5:851b0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeddf9fb0 to 0xeddf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84c08c00 r4:82ac11a4 r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 INFO: task kworker/0:622:7505 blocked for more than 478 seconds. r4:00000000 r5:00001000 r4:edbdd000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84c9a78c r4:85937880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851b0c00 r8:859378ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85937880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85937880 r8:8027f5e8 r7:eddf9e60 r6:85937900 r5:851b0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xede01fb0 to 0xede01ff8) 1fa0: 00000000 00000000 00000000 00000000 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r4:00000001 task:kworker/0:623 state:D stack:0 pid:7507 tgid:7507 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:edc61000 r7:dddced80 r6:83018000 r5:84c9a38c r4:85937980 Workqueue: events bpf_prog_free_deferred r4:00000000 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:624:7522 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:624 state:D stack:0 pid:7522 tgid:7522 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ede2dd84 r8:00000002 r7:60000113 r6:ede2dd8c r5:851b4800 r4:851b4800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851b4800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ede2de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bfa780 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:edeb9000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r9:83018005 r8:851b3000 r7:00000000 r6:83018000 r5:00001000 r4:7f891000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xedec5fb0 to 0xedec5ff8) r4:85bfae80 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:82ac11a4 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred r5:00001000 r4:ed70d000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c5c78c r4:85c5c400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c5c78c r4:85937c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851b6c00 r8:85937cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85937c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85937c80 r8:8027f5e8 r7:edec5e60 r6:85937d00 r5:851b6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedee9fb0 to 0xedee9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000001 task:kworker/0:627 state:D stack:0 pid:7579 tgid:7579 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:edce1000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe884dd28 to 0xe884dd70) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:ed6a7000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c5c38c r4:85c5c000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c5c38c r4:85937e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851b6000 r8:85937eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85937e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85937e80 r8:8027f5e8 r7:edee9e60 r6:85937f00 r5:851b6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedf11fb0 to 0xedf11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bfab80 INFO: task kworker/0:628:7588 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: b797b000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r7:dddced80 r6:83018000 r5:85c5cb8c r4:85937f80 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r5:85cc8c00 r4:82918808 r9:83018005 r8:85cc8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f8b1000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c5cf8c r4:85cfe080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85cc8c00 r8:85cfe0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85cfe080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85cfe080 r8:8027f5e8 r7:edf29e60 r6:85cfe100 r5:85cc8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedf25fb0 to 0xedf25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85cfd380 INFO: task kworker/0:630:7598 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: b7f50000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:631:7600 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:ed861000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:632:7602 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:632 state:D stack:0 pid:7602 tgid:7602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edf35d84 r8:00000002 r7:60000013 r6:edf35d8c r5:85ccb000 r4:85ccb000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85ccb000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edf35e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:ed91f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xedf35fb0 to 0xedf35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85cfd7c0 INFO: task kworker/0:632:7602 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r4:8454db00 INFO: task kworker/0:633:7603 blocked for more than 478 seconds. [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85c5d78c r4:85c5d400 Exception stack(0xedf39fb0 to 0xedf39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85cfda40 INFO: task kworker/0:633:7603 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: b847f000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:e884ddc0 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) INFO: task kworker/0:634:7607 blocked for more than 478 seconds. [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edf41e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85cfdfc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85ccc800 r7:00000000 r6:83018000 r5:00001000 r4:7f8bb000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed969000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c5df8c r4:85c5dc00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c5df8c r4:85cfe480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ccc800 r8:85cfe4ac r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85cc8000 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:85cfde40 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:636:7611 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:636 state:D stack:0 pid:7611 tgid:7611 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edf45d84 r8:00000002 r7:60000113 r6:edf45d8c r5:85cce000 r4:85cce000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85cce000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edf45e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d010c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85cce000 r7:00000000 r6:83018000 r5:00001000 r4:7f8bf000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda29000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85d01000 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8454db00 INFO: task kworker/0:637:7613 blocked for more than 478 seconds. r4:00000000 r5:00001000 r4:eda55000 r5:85c5eb8c r4:85c5e800 Exception stack(0xedf0dfb0 to 0xedf0dff8) r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:00000001 Not tainted 6.15.0-syzkaller #0 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edf4de08 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d01c80 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851b5400 r7:00000000 r6:83018000 r5:00001000 r4:7f8c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edeab000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c5fb8c r4:85c5f800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c5fb8c r4:85cfe880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851b5400 r8:85cfe8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85cfe880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85cfe880 r8:8027f5e8 r7:edf0de60 r6:85cfe900 r5:851b5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedf4dfb0 to 0xedf4dff8) Workqueue: events bpf_prog_free_deferred [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:84e5aa80 Workqueue: events bpf_prog_free_deferred [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:85ccbc00 r8:85cfe9ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe884dd28 to 0xe884dd70) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r4:85cfea80 task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: b95e1000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ede9f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xedf49fb0 to 0xedf49ff8) r4:85d01640 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r5:84fe9f8c r4:84fe9c00 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 r4:8536b000 r4:00000000 r4:00000000 r5:00001000 r4:edf71000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85c6838c r4:85cfec80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8536b000 r8:85cfecac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85cfec80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85cfec80 r8:8027f5e8 r7:edf4de60 r6:85cfed00 r5:8536b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedf5dfb0 to 0xedf5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85d01640 INFO: task kworker/0:642:7622 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: b9ab8000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:643:7624 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:8536a400 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:edf19000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 dd60: 80230ad4 80239bb0 80070013 ffffffff [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:644:7629 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:644 state:D stack:0 pid:7629 tgid:7629 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edf7dd84 r8:00000002 r7:60000013 r6:edf7dd8c r5:85c20c00 r4:85c20c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c20c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edf7de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d072c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85c20c00 r7:00000000 r6:83018000 r5:00001000 r4:7f8d3000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edf79000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c6878c r4:85c68400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c6878c r4:85cfee00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c20c00 r8:85cfee2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85cfee00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85cfee00 r8:8027f5e8 r7:edf5de60 r6:8592c080 r5:85c20c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedf7dfb0 to 0xedf7dff8) dfa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe884dd28 to 0xe884dd70) r4:82ac11a4 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:8291880c r9:edf95d84 r8:00000002 r7:60000113 r6:edf95d8c r5:85c20000 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:edf85000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xedf95fb0 to 0xedf95ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:e884f000 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:646 state:D stack:0 pid:7633 tgid:7633 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 r5:00001000 r4:edfa1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c6938c r4:85c69000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c6938c r4:85cfef00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85369800 r8:85cfef2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85cfef00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85cfef00 r8:8027f5e8 r7:edf95e60 r6:85cfef80 r5:85369800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedf69fb0 to 0xedf69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85d07140 INFO: task kworker/0:646:7633 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: ba39e000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/0:647 state:D stack:0 pid:7635 tgid:7635 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r9:83018005 r8:8536c800 r7:00000000 r6:83018000 r5:00001000 r4:7f8d7000 r5:00001000 r4:edf91000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 dd60: 80230ad4 80239bb0 80070013 ffffffff [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 r4:00000001 r4:84e5aa80 task:kworker/0:648 state:D stack:0 pid:7637 tgid:7637 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:edfb9000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8536d400 r8:85d0212c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85d07500 INFO: task kworker/0:648:7637 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: ba7d7000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:649:7638 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:649 state:D stack:0 pid:7638 tgid:7638 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:8536e000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edf59e08 r5:00001000 r4:edfad000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85d02200 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:82ac11a4 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:edfc5000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xedfb1fb0 to 0xedfb1ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:82ac11a4 r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 r4:8454db00 Exception stack(0xe884dfb0 to 0xe884dff8) r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:651:7643 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:651 state:D stack:0 pid:7643 tgid:7643 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edfc9d84 r8:00000002 r7:60000113 r6:edfc9d8c r5:8536bc00 r4:8536bc00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8536bc00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edfc9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d07d00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8536bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f8e1000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edfd1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c6a38c r4:85c6a000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c6a38c r4:85d02400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8536bc00 r8:85d0242c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85d02400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d02400 r8:8027f5e8 r7:edfb1e60 r6:85d02480 r5:8536bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedfc9fb0 to 0xedfc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85d07880 INFO: task kworker/0:651:7643 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: bb00e000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) INFO: task kworker/0:652:7645 blocked for more than 478 seconds. r4:85ccec00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edfd5e08 r5:00001000 r4:edfe9000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85c6ab8c r4:85d02500 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 r4:00000000 r5:84fe9f8c r4:84fe9c00 r4:8454db00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:edfdd000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c6a78c r4:85c6a400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c6a78c r4:85d02600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85cd0000 r8:85d0262c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85d02600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d02600 r8:8027f5e8 r7:edfd5e60 r6:85d02680 r5:85cd0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedfe1fb0 to 0xedfe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85d07dc0 INFO: task kworker/0:653:7647 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: bb1be000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:654:7649 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:654 state:D stack:0 pid:7649 tgid:7649 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edfedd84 r8:00000002 r7:60000113 r6:edfedd8c r5:85cd0c00 r4:85cd0c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85cd0c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:edff5000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85c6af8c r4:85c6ac00 r10:61c88647 r9:85cd0c00 r8:85d0272c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:655:7651 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:655 state:D stack:0 pid:7651 tgid:7651 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:edff9d84 r8:00000002 r7:60000113 r6:edff9d8c r5:85cd1800 r4:85cd1800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85cd1800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edff9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bfe0c0 r5:00001000 r4:ee001000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85cd1800 r8:85d0282c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85cd2400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee005e08 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee00d000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xee005fb0 to 0xee005ff8) task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11a4 r4:00000000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:657:7655 blocked for more than 478 seconds. r4:85cd3000 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee011e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bfe4c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85cd3000 r7:00000000 r6:83018000 r5:00001000 r4:7f8ed000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee019000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c6bb8c r4:85c6b800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c6bb8c r4:85d02a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85cd3000 r8:85d02a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85d02a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d02a00 r8:8027f5e8 r7:ee005e60 r6:85d02a80 r5:85cd3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee011fb0 to 0xee011ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bfe200 INFO: task kworker/0:657:7655 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: bb9ec000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:ee025000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:84e5aa80 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ee031000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c7038c r4:85d02c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85cd4800 r8:85d02c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85d02c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d02c00 r8:8027f5e8 r7:ee01de60 r6:85d02c80 r5:85cd4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee029fb0 to 0xee029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bfe440 INFO: task kworker/0:659:7659 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: bc04d000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:660:7661 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:660 state:D stack:0 pid:7661 tgid:7661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:85cd6000 r4:00000000 r9:83018005 r8:85cd6000 r7:00000000 r6:83018000 r5:00001000 r4:7f88f000 r5:00001000 r4:ed12b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85cd6000 r8:85d02d2c r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:82ac11a4 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r4:84e5aa80 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85ce0000 r7:00000000 r6:83018000 r5:00001000 r4:7f88d000 r5:00001000 r4:dfd95000 r5:85c7078c r4:85c70400 r10:61c88647 r9:85ce0000 r8:85d02e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85d02e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d02e00 r8:8027f5e8 r7:edfbde60 r6:85d02e80 r5:85ce0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee041fb0 to 0xee041ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bfe880 INFO: task kworker/0:661:7663 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: bc280000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:662:7665 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:662 state:D stack:0 pid:7665 tgid:7665 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ee045d84 r8:00000002 r7:60000113 r6:ee045d8c r5:85ce1800 r4:85ce1800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85ce1800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee045e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018005 r8:85ce1800 r7:00000000 r6:83018000 r5:00001000 r4:7f895000 r5:00001000 r4:edb71000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xee045fb0 to 0xee045ff8) Workqueue: events bpf_prog_free_deferred r4:00000000 dd60: 80230ad4 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe884dfb0 to 0xe884dff8) Not tainted 6.15.0-syzkaller #0 r4:85ce2400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee049e08 r9:83018005 r8:85ce2400 r7:00000000 r6:83018000 r5:00001000 r4:7f891000 r5:00001000 r4:edad1000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xee049fb0 to 0xee049ff8) r4:85bfe700 [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:e884f000 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ee035d84 r8:00000002 r7:60000113 r6:ee035d8c r5:85ce3000 r4:85ce3000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85ce3000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee035e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d07f80 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85ce3000 r7:00000000 r6:83018000 r5:00001000 r4:7f8f3000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edb93000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c7178c r4:85c71400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c7178c r4:85bf7100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ce3000 r8:85bf712c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85bf7100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bf7100 r8:8027f5e8 r7:ee045e60 r6:85bf7180 r5:85ce3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee035fb0 to 0xee035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bfee80 INFO: task kworker/0:664:7669 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: bca6b000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:665 state:D stack:0 pid:7671 tgid:7671 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:edbbf000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd20: bca6b000 e47a4000 00000001 80239b98 7f1cb000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:666 state:D stack:0 pid:7674 tgid:7674 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee051e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85be60c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85ce4800 r7:00000000 r6:83018000 r5:00001000 r4:7f8f7000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edbdb000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c71f8c r4:85c71c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c71f8c r4:85bf7300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ce4800 r8:85bf732c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85bf7300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bf7300 r8:8027f5e8 r7:ee04de60 r6:85bf7380 r5:85ce4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee051fb0 to 0xee051ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85be6000 INFO: task kworker/0:666:7674 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: bd27f000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:667:7675 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:667 state:D stack:0 pid:7675 tgid:7675 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:85ce5400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee055e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85be6380 r5:00001000 r4:edc03000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:82ac11a4 r4:00000000 r5:84fe9f8c r4:84fe9c00 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:00001000 r4:edc2b000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85ce6c00 r8:85bf752c r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) dd20: bd920000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:669:7678 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:669 state:D stack:0 pid:7678 tgid:7678 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ee05dd84 r8:00000002 r7:60000113 r6:ee05dd8c r5:85ce0c00 r4:85ce0c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85ce0c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee05de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85be66c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85ce0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f8fd000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c72b8c r4:85c72800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c72b8c r4:85bf7600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85ce0c00 r8:85bf762c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85bf7600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bf7600 r8:8027f5e8 r7:df98de60 r6:85bf7680 r5:85ce0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee05dfb0 to 0xee05dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85be6340 INFO: task kworker/0:669:7678 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd60: 80230ad4 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r5:84fe9f8c r4:84fe9c00 r4:8454db00 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:670 state:D stack:0 pid:7682 tgid:7682 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85be6900 r5:00001000 r4:edc7b000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85be6840 INFO: task kworker/0:670:7682 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: be4ac000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:671:7683 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:671 state:D stack:0 pid:7683 tgid:7683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85be6800 r5:00001000 r4:edc5f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c72f8c r4:85c72c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c72f8c r4:85bf7800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85cd6c00 r8:85bf782c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85bf7800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bf7800 r8:8027f5e8 r7:ee059e60 r6:85bf7880 r5:85cd6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee061fb0 to 0xee061ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85be6680 INFO: task kworker/0:671:7683 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 Exception stack(0xe884dd28 to 0xe884dd70) r4:82ac11a4 r4:00000000 r5:84fe9f8c r4:84fe9c00 r4:8454db00 dfa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:edc93000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85c7378c r4:85c73400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:82ac11a4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:673:7688 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:673 state:D stack:0 pid:7688 tgid:7688 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ee069d84 r8:00000002 r7:60000013 r6:ee069d8c r5:84c68000 r4:84c68000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c68000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee069e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85be6c40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84c68000 r7:00000000 r6:83018000 r5:00001000 r4:7f905000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edcad000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c73b8c r4:85c73800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c73b8c r4:85bf7a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c68000 r8:85bf7a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85bf7a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bf7a00 r8:8027f5e8 r7:ee065e60 r6:85bf7a80 r5:84c68000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee069fb0 to 0xee069ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85be6980 INFO: task kworker/0:673:7688 is blocked on a mutex likely owned by task kworker/1:174:3878. Workqueue: events bpf_prog_free_deferred dd20: befaf000 e47a4000 00000001 80239b98 7f1cb000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r5:84fe9f8c r4:84fe9c00 r4:8454db00 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:674 state:D stack:0 pid:7689 tgid:7689 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:edccf000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85c73f8c r4:85c73c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd20: befaf000 e47a4000 00000001 80239b98 7f1cb000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85be6f80 r5:00001000 r4:edceb000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8508c38c r4:85bf7c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee075fb0 to 0xee075ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85be6c80 INFO: task kworker/0:675:7692 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: bf80b000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:676:7694 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:676 state:D stack:0 pid:7694 tgid:7694 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ee079d84 r8:00000002 r7:60000013 r6:ee079d8c r5:84c6a400 r4:84c6a400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c6a400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee079e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a67180 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84c6a400 r7:00000000 r6:83018000 r5:00001000 r4:7f90d000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd27000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8508cb8c r4:8508c800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8508cb8c r4:85bf7d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c6a400 r8:85bf7d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85bf7d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bf7d00 r8:8027f5e8 r7:ee075e60 r6:85bf7d80 r5:84c6a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee079fb0 to 0xee079ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85be6d80 INFO: task kworker/0:676:7694 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd60: 80230ad4 80239bb0 80070013 ffffffff r4:e884ddc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:677:7695 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:677 state:D stack:0 pid:7695 tgid:7695 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ee06dd84 r8:00000002 r7:60000113 r6:ee06dd8c r5:84c6b000 r4:84c6b000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c6b000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee06de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d048c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84c6b000 r7:00000000 r6:83018000 r5:00001000 r4:7f90b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd05000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8508c78c r4:8508c400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8508c78c r4:85bf7e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c6b000 r8:85bf7e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85bf7e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bf7e00 r8:8027f5e8 r7:ee079e60 r6:85bf7e80 r5:84c6b000 r4:85be6f00 Workqueue: events bpf_prog_free_deferred dd20: bfe7e000 e47a4000 00000001 80239b98 7f1cb000 00000001 r4:e884ddc0 r5:00001000 r4:e884f000 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe884dfb0 to 0xe884dff8) Not tainted 6.15.0-syzkaller #0 [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:edf03000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8508d78c r4:8508d400 r10:61c88647 r9:84c6bc00 r8:85bf7f2c r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd20: bfe7e000 e47a4000 00000001 80239b98 7f1cb000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:84e5aa80 task:kworker/0:679 state:D stack:0 pid:7700 tgid:7700 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee081e08 r9:83018005 r8:84c6c800 r7:00000000 r6:83018000 r5:00001000 r4:7f90f000 r5:00001000 r4:ede45000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) dd20: c08fc000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:680:7701 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:680 state:D stack:0 pid:7701 tgid:7701 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ee085d84 r8:00000002 r7:60000013 r6:ee085d8c r5:84c6d400 r4:84c6d400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c6d400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee085e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a67440 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84c6d400 r7:00000000 r6:83018000 r5:00001000 r4:7f911000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edef7000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8508d38c r4:8508d000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8508d38c r4:84ee6100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c6d400 r8:84ee612c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ee6100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ee6100 r8:8027f5e8 r7:ee07de60 r6:84ee6180 r5:84c6d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee085fb0 to 0xee085ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a67140 INFO: task kworker/0:680:7701 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: c08fc000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:84c6e000 r4:82918808 r4:00000000 r4:00000000 r5:00001000 r4:ee095000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd20: c0b3d000 e47a4000 00000001 80239b98 7f1cb000 00000001 r4:e884ddc0 r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe884dfb0 to 0xe884dff8) r4:84e5aa80 task:kworker/0:682 state:D stack:0 pid:7705 tgid:7705 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a67840 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84c6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f915000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edf15000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8508db8c r4:8508d800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8508db8c r4:84ee6300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c6ec00 r8:84ee632c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ee6300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ee6300 r8:8027f5e8 r7:ee08de60 r6:84ee6380 r5:84c6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee089fb0 to 0xee089ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a676c0 INFO: task kworker/0:682:7705 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: c13de000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:683:7708 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:683 state:D stack:0 pid:7708 tgid:7708 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ee0a5d84 r8:00000002 r7:60000113 r6:ee0a5d8c r5:85390000 r4:85390000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85390000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee0a5e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a678c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85390000 r7:00000000 r6:83018000 r5:00001000 r4:7f91b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee0ad000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8508e78c r4:8508e400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8508e78c r4:84ee6400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85390000 r8:84ee642c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ee6400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ee6400 r8:8027f5e8 r7:ee08de60 r6:84ee6480 r5:85390000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee0a5fb0 to 0xee0a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a67740 INFO: task kworker/0:683:7708 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: c1ba7000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 Not tainted 6.15.0-syzkaller #0 [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ee0a1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8508e38c r4:84ee6500 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:685:7711 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:685 state:D stack:0 pid:7711 tgid:7711 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ee0b1d84 r8:00000002 r7:60000013 r6:ee0b1d8c r5:85391800 r4:85391800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85391800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee0b1e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a67dc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85391800 r7:00000000 r6:83018000 r5:00001000 r4:7f91d000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee0b9000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8508eb8c r4:8508e800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8508eb8c r4:84ee6600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85391800 r8:84ee662c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ee6600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ee6600 r8:8027f5e8 r7:ee0a5e60 r6:84ee6680 r5:85391800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee0b1fb0 to 0xee0b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a67d00 INFO: task kworker/0:685:7711 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: c1ba7000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r4:85392400 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:00001000 r4:ee0c5000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84ee6700 r8:8027f5e8 r7:ee0b1e60 r6:84ee6780 r5:85392400 r4:84ce4000 [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:e884f000 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:687 state:D stack:0 pid:7715 tgid:7715 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee0d5e08 r4:00000000 r5:00001000 r4:ee0d1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: c291b000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:688:7717 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:688 state:D stack:0 pid:7717 tgid:7717 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ee0c9d84 r8:00000002 r7:60000013 r6:ee0c9d8c r5:85393c00 r4:85393c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85393c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee0c9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ce4380 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85393c00 r7:00000000 r6:83018000 r5:00001000 r4:7f923000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee0dd000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8508f78c r4:8508f400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8508f78c r4:84ee6900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85393c00 r8:84ee692c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ee6900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ee6900 r8:8027f5e8 r7:ee0d5e60 r6:84ee6980 r5:85393c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee0c9fb0 to 0xee0c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ce42c0 INFO: task kworker/0:688:7717 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: c291b000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r5:00001000 r4:e884f000 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe884dfb0 to 0xe884dff8) INFO: task kworker/0:689:7719 blocked for more than 479 seconds. [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r4:00000000 r5:00001000 r4:ee0e9000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8508fb8c r4:8508f800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8508fb8c r4:84ee6a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85394800 r8:84ee6a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ee6a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ee6a00 r8:8027f5e8 r7:ee0c9e60 r6:84ee6a80 r5:85394800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee0e1fb0 to 0xee0e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ce4200 INFO: task kworker/0:689:7719 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: c291b000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:690:7721 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ce4840 r5:00001000 r4:ee101000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85d3438c r4:85d34000 r10:61c88647 r9:85395400 r8:84ee6b2c r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11a4 r4:00000000 r5:84fe9f8c r4:84fe9c00 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e5aa80 task:kworker/0:691 state:D stack:0 pid:7723 tgid:7723 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ce46c0 r5:00001000 r4:ee0f5000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fa0: 00000000 00000000 00000000 00000000 [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:e884f000 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:692 state:D stack:0 pid:7725 tgid:7725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ee105d84 r8:00000002 r7:60000113 r6:ee105d8c r5:85396c00 r4:85396c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85396c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee105e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ce49c0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85396c00 r7:00000000 r6:83018000 r5:00001000 r4:7f92b000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee10d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d3478c r4:85d34400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d3478c r4:84ee6d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85396c00 r8:84ee6d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ee6d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ee6d00 r8:8027f5e8 r7:ee0ede60 r6:84ee6d80 r5:85396c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee105fb0 to 0xee105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ce4640 INFO: task kworker/0:692:7725 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: c2de9000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:693:7727 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:693 state:D stack:0 pid:7727 tgid:7727 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ee111d84 r8:00000002 r7:60000113 r6:ee111d8c r5:85d70000 r4:85d70000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85d70000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee111e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r4:00000000 r5:00001000 r4:ee119000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:82ac11a4 r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:694:7730 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:694 state:D stack:0 pid:7730 tgid:7730 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ee11dd84 r8:00000002 r7:60000113 r6:ee11dd8c r5:85d70c00 r4:85d70c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85d70c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee11de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ce4cc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85d70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f92f000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee125000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d34f8c r4:85d34c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d34f8c r4:84ee6f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85d70c00 r8:84ee6f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ee6f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ee6f00 r8:8027f5e8 r7:ee111e60 r6:84ee6f80 r5:85d70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd60: 80230ad4 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ee149000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85d35b8c r4:85055000 Exception stack(0xee129fb0 to 0xee129ff8) task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11a4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe884dfb0 to 0xe884dff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:00000000 r4:00000000 r5:00001000 r4:ee131000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d3538c r4:85d35000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d3538c r4:85055100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85d72400 r8:8505512c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85055100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85055100 r8:8027f5e8 r7:ee129e60 r6:85055180 r5:85d72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee135fb0 to 0xee135ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ce4c40 INFO: task kworker/0:696:7733 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: c3b23000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:697:7735 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:697 state:D stack:0 pid:7735 tgid:7735 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ee14dd84 r8:00000002 r7:60000113 r6:ee14dd8c r5:85d73c00 r4:85d73c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85d73c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee14de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ce4fc0 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85d73c00 r7:00000000 r6:83018000 r5:00001000 r4:7f933000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee13d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d3578c r4:85d35400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d3578c r4:85055200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85d73c00 r8:8505522c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85055200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85055200 r8:8027f5e8 r7:ee129e60 r6:85055280 r5:85d73c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: c3b23000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:698:7737 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:698 state:D stack:0 pid:7737 tgid:7737 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ee159d84 r8:00000002 r7:60000013 r6:ee159d8c r5:85d74800 r4:85d74800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:00001000 r4:ee161000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: c3f7a000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:699 state:D stack:0 pid:7738 tgid:7738 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505a240 r5:00001000 r4:ee155000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85d35f8c r4:85055400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:82ac11a4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee141e08 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee171000 r7:dddced80 r6:83018000 r5:85d3678c r4:85055500 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:e884f000 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:701 state:D stack:0 pid:7742 tgid:7742 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ee175d84 r8:00000002 r7:60000113 r6:ee175d8c r5:85d73000 r4:85d73000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85d73000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee175e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505aa00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85d73000 r7:00000000 r6:83018000 r5:00001000 r4:7f943000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee19d000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d36b8c r4:85d36800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d36b8c r4:85055600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85d73000 r8:8505562c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85055600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85055600 r8:8027f5e8 r7:ee141e60 r6:85055680 r5:85d73000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee175fb0 to 0xee175ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8505a400 INFO: task kworker/0:701:7742 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: c4410000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8454db00 dfa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505ab40 r5:00001000 r4:ee1a9000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85055700 r8:8027f5e8 r7:ee175e60 r6:85055780 r5:845a0c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11a4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee1b1000 r5:85d3738c r4:85d37000 r10:61c88647 r9:845a1800 r8:8505582c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8505a9c0 [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: c4d72000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:704:7752 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:704 state:D stack:0 pid:7752 tgid:7752 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ee189d84 r8:00000002 r7:60000013 r6:ee189d8c r5:845a2400 r4:845a2400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:845a2400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee189e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505ae40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:845a2400 r7:00000000 r6:83018000 r5:00001000 r4:7f949000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee1b9000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d3778c r4:85d37400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d3778c r4:85055900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:845a2400 r8:8505592c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85055900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85055900 r8:8027f5e8 r7:ee169e60 r6:85055980 r5:845a2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee189fb0 to 0xee189ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8505ab00 INFO: task kworker/0:704:7752 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 dd20: c52e5000 e47a4000 00000001 80239b98 7f1cb000 00000001 r4:e884ddc0 r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ee1c5000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:845a3000 r8:85055a2c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8505acc0 INFO: task kworker/0:705:7754 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: c52e5000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:706:7755 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:706 state:D stack:0 pid:7755 tgid:7755 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:845a3c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee1cde08 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd85000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xee1cdfb0 to 0xee1cdff8) r4:8505ae00 Workqueue: events bpf_prog_free_deferred dd20: c58aa000 e47a4000 00000001 80239b98 7f1cb000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r5:00001000 r4:e884f000 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:00000000 r4:00000000 r5:00001000 r4:ed6c1000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85d40b8c r4:85055c00 r10:00000000 r9:85055c00 r8:8027f5e8 r7:ee1cde60 r6:8592c180 r5:85c24800 r4:84d491c0 [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8454db00 Exception stack(0xe884dfb0 to 0xe884dff8) Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee1e9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d49280 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85c26c00 r7:00000000 r6:83018000 r5:00001000 r4:7f8ab000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed413000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4038c r4:85d40000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d4038c r4:85055c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c26c00 r8:85055cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85055c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85055c80 r8:8027f5e8 r7:ee1dde60 r6:8592c200 r5:85c26c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee1e9fb0 to 0xee1e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d49100 INFO: task kworker/0:708:7761 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: c58aa000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 INFO: task kworker/0:709:7762 blocked for more than 479 seconds. r4:85c23c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee1ede08 r5:00001000 r4:ed633000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xee1edfb0 to 0xee1edff8) Workqueue: events bpf_prog_free_deferred dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 r5:00001000 r4:e884f000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:8291880c r9:ee1f1d84 r8:00000002 r7:60000113 r6:ee1f1d8c r5:85c26000 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ed761000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d40f8c r4:85d40c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d40f8c r4:85055d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c26000 r8:85055dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85055d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85055d80 r8:8027f5e8 r7:ee1dde60 r6:8592c300 r5:85c26000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee1f1fb0 to 0xee1f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d493c0 INFO: task kworker/0:710:7764 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: c5e5d000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:711:7766 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 r10:8291880c r9:ee1f5d84 r8:00000002 r7:60000113 r6:ee1f5d8c r5:85c22400 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ed7f5000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe884dd28 to 0xe884dd70) r4:82ac11a4 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:712:7768 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:712 state:D stack:0 pid:7768 tgid:7768 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ee1f9d84 r8:00000002 r7:60000013 r6:ee1f9d8c r5:85c23000 r4:85c23000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c23000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee1f9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 r5:00001000 r4:ed8d7000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d41b8c r4:85d41800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d41b8c r4:85055e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c23000 r8:85055eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85055e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85055e80 r8:8027f5e8 r7:ee1f5e60 r6:8592c400 r5:85c23000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee1f9fb0 to 0xee1f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d496c0 INFO: task kworker/0:712:7768 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: c619a000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe884dfb0 to 0xe884dff8) Not tainted 6.15.0-syzkaller #0 r4:85c21800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee1fde08 r5:00001000 r4:ed86f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8454db00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:714 state:D stack:0 pid:7773 tgid:7773 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ee209d84 r8:00000002 r7:60000013 r6:ee209d8c r5:85c18c00 r4:85c18c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c18c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee209e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d49d40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85c18c00 r7:00000000 r6:83018000 r5:00001000 r4:7f8bd000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed981000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4238c r4:85d42000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d4238c r4:85055f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c18c00 r8:85055fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85055f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85055f80 r8:8027f5e8 r7:ee1f9e60 r6:8592c500 r5:85c18c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee209fb0 to 0xee209ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d49940 INFO: task kworker/0:714:7773 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: c6671000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:8291880c r9:ee20dd84 r8:00000002 r7:60000013 r6:ee20dd8c r5:85c16c00 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:ed90f000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xee20dfb0 to 0xee20dff8) task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xe884dfb0 to 0xe884dff8) task:kworker/0:716 state:D stack:0 pid:7776 tgid:7776 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eda4d000 [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xee1c9fb0 to 0xee1c9ff8) task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: c6e3b000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:717:7777 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:717 state:D stack:0 pid:7777 tgid:7777 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ee1d9d84 r8:00000002 r7:60000013 r6:ee1d9d8c r5:845a6000 r4:845a6000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:845a6000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee1d9e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d49e40 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:845a6000 r7:00000000 r6:83018000 r5:00001000 r4:7f8bf000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda0f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4278c r4:85d42400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d4278c r4:85951180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:845a6000 r8:859511ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85951180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85951180 r8:8027f5e8 r7:ee1c9e60 r6:85951200 r5:845a6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee1d9fb0 to 0xee1d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:717:7777 is blocked on a mutex likely owned by task kworker/1:174:3878. Exception stack(0xe884dd28 to 0xe884dd70) r4:82ac11a4 r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:8291880c r9:ee211d84 r8:00000002 r7:60000013 r6:ee211d8c r5:845a6c00 [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ede73000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85d4338c r4:85951280 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8454db00 Exception stack(0xe884dfb0 to 0xe884dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:719:7782 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:719 state:D stack:0 pid:7782 tgid:7782 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ee219d84 r8:00000002 r7:60000013 r6:ee219d8c r5:845a5400 r4:845a5400 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:845a5400 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee219e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bd3380 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:845a5400 r7:00000000 r6:83018000 r5:00001000 r4:7f8c3000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda81000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d42f8c r4:85d42c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d42f8c r4:85951380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:845a5400 r8:859513ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85951380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85951380 r8:8027f5e8 r7:ee211e60 r6:85951400 r5:845a5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee219fb0 to 0xee219ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d49f40 INFO: task kworker/0:719:7782 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: c740b000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:720:7783 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:720 state:D stack:0 pid:7783 tgid:7783 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ee215d84 r8:00000002 r7:60000113 r6:ee215d8c r5:845a0000 r4:845a0000 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:845a0000 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee215e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8586e300 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:845a0000 r7:00000000 r6:83018000 r5:00001000 r4:7f8c9000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edeaf000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d43b8c r4:85d43800 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:845a0000 r8:859514ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xee215fb0 to 0xee215ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 INFO: task kworker/0:720:7783 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: c740b000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:721:7786 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:721 state:D stack:0 pid:7786 tgid:7786 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a5614c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a551c4>] (__schedule) from [<81a5614c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8291880c r9:ee21dd84 r8:00000002 r7:60000013 r6:ee21dd8c r5:85d76c00 r4:85d76c00 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85d76c00 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee21de08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8586e100 r4:00000000 r9:83018005 r8:85d76c00 r7:00000000 r6:83018000 r5:00001000 r4:7f8c7000 r5:00001000 r4:edea3000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85d4378c r4:85951580 Exception stack(0xee21dfb0 to 0xee21dff8) INFO: task kworker/0:721:7786 is blocked on a mutex likely owned by task kworker/1:174:3878. Exception stack(0xe884dd28 to 0xe884dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:84e5aa80 Workqueue: events bpf_prog_free_deferred [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85d43f8c r4:85951680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c28c00 r8:859516ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85951680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85951680 r8:8027f5e8 r7:ee215e60 r6:8592c600 r5:85c28c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee229fb0 to 0xee229ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8586e180 INFO: task kworker/0:722:7788 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: c79c2000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:723:7791 blocked for more than 479 seconds. Workqueue: events bpf_prog_free_deferred r10:8291880c r9:ee22dd84 r8:00000002 r7:60000113 r6:ee22dd8c r5:85c2a400 r5:85c2a400 r4:82918808 [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:edf75000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4838c r4:85d48000 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85c2a400 r8:8595172c r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe884dd28 to 0xe884dd70) r4:82ac11a4 r4:00000000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:85c29800 [<81a56120>] (schedule) from [<81a56534>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c29800 r4:82918808 [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a5651c>] (schedule_preempt_disabled) from [<81a58c18>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a58918>] (__mutex_lock.constprop.0) from [<81a590e4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee239e08 r4:00000000 [<81a590d0>] (__mutex_lock_slowpath) from [<81a59124>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a590e8>] (mutex_lock) from [<804e0f94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8586e740 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85c29800 r7:00000000 r6:83018000 r5:00001000 r4:7f8d5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edf83000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4878c r4:85d48400 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d4878c r4:85951780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c29800 r8:859517ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85951780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85951780 r8:8027f5e8 r7:ee22de60 r6:8592c700 r5:85c29800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee239fb0 to 0xee239ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8586e400 INFO: task kworker/0:724:7794 is blocked on a mutex likely owned by task kworker/1:174:3878. task:kworker/1:174 state:R running task stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a551c4>] (__schedule) from [<81a56580>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac1184 r9:85022400 r8:80200be4 r7:e884dd5c r6:ffffffff r5:85022400 r4:00000000 [<81a56540>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe884dd28 to 0xe884dd70) dd20: c79c2000 e47a4000 00000001 80239b98 7f1cb000 00000001 dd40: 82ac0560 7f1cb000 e47a4000 8280c930 82ac1184 e884dda4 e884dda8 e884dd78 dd60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e0d68>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac11a4 [<804e0b58>] (__purge_vmap_area_lazy) from [<804e1110>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e884ddc0 r5:e884de08 r4:e884ddc0 [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e0f2c>] (_vm_unmap_aliases) from [<804e4e74>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e5ad00 r4:00000000 [<804e4d0c>] (vfree) from [<8054472c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85022400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<805446fc>] (execmem_free) from [<803c515c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884f000 [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c514c>] (bpf_jit_free_exec) from [<803c553c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c54d4>] (bpf_jit_free) from [<803c6698>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803c654c>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fe9f8c r4:8454db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:8454db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454db00 r8:8027f5e8 r7:e8839e60 r6:8454db80 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe884dfb0 to 0xe884dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e5aa80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:725:7796 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.